Class and Study Material
Weekly Videos
https://foxcapture.temple.edu/Mediasite/Catalog/catalogs/sp18mis5170002
3/20 WebEx Only recording (Snow Day) – https://templeuniversity.webex.com/templeuniversity/ldr.php?RCID=5d85fcd4e5ad9192793ca9fd57883d92
Week Objectives…
STUDENT suggested Readings
http://www.foxnews.com/tech/2018/02/09/scam-hijacks-google-chrome-browser-tries-to-get-your-personal-data.amp.html – (Neil Rushi)
https://www.amazon.com/Quantum-Spy-Thriller-David-Ignatius/dp/0393254151/ref=sr_1_1?ie=UTF8&qid=1518445573&sr=8-1&keywords=the+quantum+spy – (Paul Ihlenfeld)
https://www.nist.gov/news-events/news/2017/09/physicist-who-working-accelerate-change-forensic-science – (Oby Okereke)
https://commons.erau.edu/cgi/viewcontent.cgi?article=1201&context=jdfsl – (Brent Hladik)
https://www.dfcb.org/DFCB_DFCB_Code_of_Ethics_and_Standards_of_Professional_Conduct_Version_1.1_Dec08.pdf – (Brent Hladik)
http://www.nextgov.com/it-modernization/2014/07/cloud-computing-complicates-digital-forensics-investigations/89579/ – (Brent Hladik)
cloudforensicsresearch.org/ – (Brent Hladik)
http://www.philly.com/philly/business/court-dismisses-claim-that-government-illegally-hacked-computers-to-prosecute-child-porn-case-20180222.html – (Paul Ihlenfeld)
http://www.lawtechjournal.com/home/articles/619/ – (Brent Hladik)
https://www.reuters.com/article/us-usa-court-mobilephone/u-s-supreme-court-to-settle-major-cellphone-privacy-case-idUSKBN18W1RY – (Brent Hladik)
http://logikcull.com/why-end-ediscovery – (Brent Hladik)
https://www.americanbar.org/content/dam/aba/publications/law_practice_today/breaking-into-e-discovery.authcheckdam.pdf – (Brent Hladik)
http://www.lawtechnologytoday.org/2014/09/challenges-of-mobile-devices-byod-and-ediscovery/ – (Satwika Balakrishnan)
National institute of Justice publications on Cybercrime – few of them are really interesting – NIJ is the research, development and evaluation agency of the U.S. Department of Justice. We accomplish our mission through the “Listen, Learn, Inform” model — we “listen” to the needs of the field; “learn” ways to meet those needs by funding research, development, and evaluation projects; and then “inform” the field of what we learned.
https://www.nij.gov/topics/forensics/evidence/digital/Pages/welcome.aspx – (Jayapreethi Selvaraju)
The journal of Digital Forensics, security and law https://commons.erau.edu/jdfsl/ – (Jayapreethi Selvaraju)
Podcasts on digital forensics: http://www.digitalforensicsassociation.org/podcasts/ – (Jayapreethi Selvaraju)
Computer Forensics from Lynda.com: (Mustafa Aydin)
- https://www.lynda.com/Developer-tutorials/Computer-Forensics-Essential-Training/170337-2.html
- https://www.lynda.com/Developer-tutorials/Computer-forensics-tools/170337/186813-4.html
- https://www.lynda.com/Security-tutorials/Computer-Security-Investigation-Response/419360-2.html
- https://www.lynda.com/Wireshark-tutorials/Wireshark-Malware-Forensics/624305-2.html
https://www.ftc.gov/system/files/documents/plain-language/pdf-0154_data-breach-response-guide-for-business.pdf – (Brent Hladik)
https://www.brookings.edu/wp-content/uploads/2016/07/Patient-Privacy504v3.pdf – (Brent Hladik)
https://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/overview-of-digital-forensics.aspx – (Ahmed Alkaysi)
Who’s Reading Your Email? – https://www.insidehighered.com/news/2018/04/02/unauthorized-searches-professors-email-create-rift-rochester?utm_source=Inside+Higher+Ed&utm_campaign=4167f5c7f9-DNU20180111&utm_medium=email&utm_term=0_1fcbc04421-4167f5c7f9-197578045&mc_cid=4167f5c7f9&mc_eid=d362591d16 – (Sue Banka Temple ITS)
CERT Definition of ‘Insider Threat’ – Updated – https://insights.sei.cmu.edu/insider-threat/2017/03/cert-definition-of-insider-threat—updated.html – (LB)
Risk Management program around insider threats, from educating the employees to the controls around certain areas mapped to standards such as NIST.
https://resources.sei.cmu.edu/asset_files/TechnicalReport/2012_005_001_34033.pdf – (Ahmed Alkaysi)
Interesting recent news info on the Ransomeware attack on city of Atlanta… http://www.foxnews.com/tech/2018/03/29/atlanta-still-battling-effects-ransomware-attack-experts-says-hack-should-be-national-wakeup-call.html – (Paul Ihlenfeld)
Study of Latest Emerging Trends on Cyber Security and its challenges to Society
https://www.ijser.org/researchpaper/Study-of-Latest-Emerging-Trends-on-Cyber-Security-and-its-challenges-to-Society.pdf – (Brent Hladik)
Vulnerability of IT Infrastructures: Internal and External Threats
https://pdfs.semanticscholar.org/873d/522c5294ef5575ee26ef4b5bafba6784a4e3.pdf – (Brent Hladik)
A Threat-Driven Approach to Cyber Security
https://lockheedmartin.com/content/dam/lockheed/data/isgs/documents/Threat-Driven%20Approach%20whitepaper.pdf – (Brent Hladik)
INSIDER THREAT BEST PRACTICES GUIDE, 2ND EDITION
https://www.sifma.org/wp-content/uploads/2018/02/insider-threat-best-practices-guide.pdf – (Brent Hladik)
Challenges of Cloud Forensics: A Survey of the Missing Capabilities
https://ercim-news.ercim.eu/en90/special/challenges-of-cloud-forensics-a-survey-of-the-missing-capabilities – (Ahmed Alkaysi)
Data privacy: What your employees don’t know but should
https://www.cio.com/article/3261946/privacy/data-privacy-what-your-employees-dont-know-but-should.html – (Neil Rushi)