{"id":3104,"date":"2017-02-23T22:18:57","date_gmt":"2017-02-24T03:18:57","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/?page_id=3104"},"modified":"2018-04-17T16:25:50","modified_gmt":"2018-04-17T20:25:50","slug":"material","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/material\/","title":{"rendered":"Material"},"content":{"rendered":"<p><strong>Class and Study Material<\/strong><\/p>\n<p><strong>Weekly Videos<\/strong><\/p>\n<p><a href=\"https:\/\/foxcapture.temple.edu\/Mediasite\/Catalog\/catalogs\/sp18mis5170002\">https:\/\/foxcapture.temple.edu\/Mediasite\/Catalog\/catalogs\/sp18mis5170002<\/a><\/p>\n<p>3\/20 WebEx Only recording (Snow Day) &#8211;\u00a0<a href=\"https:\/\/templeuniversity.webex.com\/templeuniversity\/ldr.php?RCID=5d85fcd4e5ad9192793ca9fd57883d92\">https:\/\/templeuniversity.webex.com\/templeuniversity\/ldr.php?RCID=5d85fcd4e5ad9192793ca9fd57883d92<\/a><\/p>\n<p><strong>Week Objectives&#8230;<\/strong><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/files\/2018\/03\/Week-1-Forensic-Objectives.pptx\" target=\"_blank\" rel=\"noopener\">Week 1 Forensic Objectives<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/files\/2018\/03\/Week-2-Forensic-Objectives.pptx\" target=\"_blank\" rel=\"noopener\">Week 2 Forensic Objectives<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/files\/2018\/03\/Week-3-Forensic-Objectives.pptx\" target=\"_blank\" rel=\"noopener\">Week 3 Forensic Objectives<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/files\/2018\/03\/Week-4-Forensic-Objectives.pptx\" target=\"_blank\" rel=\"noopener\">Week 4 Forensic Objectives<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/files\/2018\/03\/Week-6-Forensic-Objectives.pptx\">Week 6 Forensic Objectives<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/files\/2018\/03\/Week-7-Forensic-Objectives.pptx\">Week 7 Forensic Objectives<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/files\/2018\/03\/Week-8-Forensic-Objectives.pptx\">Week 8 Forensic Objectives<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/files\/2017\/02\/Week-9-Forensic-Objectives.pptx\">Week 9 Forensic Objectives<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/files\/2017\/02\/Week-11-Forensic-Objectives.pptx\">Week 11 Forensic Objectives<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/files\/2017\/02\/Week-12-Forensic-Objectives.pptx\">Week 12 Forensic Objectives<\/a><\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/files\/2017\/02\/Week-13-Forensic-Objectives.pptx\">Week 13 Forensic Objectives<\/a><\/p>\n<p><strong>STUDENT suggested Readings<\/strong><\/p>\n<p><a href=\"http:\/\/www.foxnews.com\/tech\/2018\/02\/09\/scam-hijacks-google-chrome-browser-tries-to-get-your-personal-data.amp.html\">http:\/\/www.foxnews.com\/tech\/2018\/02\/09\/scam-hijacks-google-chrome-browser-tries-to-get-your-personal-data.amp.html<\/a>\u00a0&#8211; (Neil Rushi)<\/p>\n<p><a href=\"https:\/\/www.amazon.com\/Quantum-Spy-Thriller-David-Ignatius\/dp\/0393254151\/ref=sr_1_1?ie=UTF8&amp;qid=1518445573&amp;sr=8-1&amp;keywords=the+quantum+spy\">https:\/\/www.amazon.com\/Quantum-Spy-Thriller-David-Ignatius\/dp\/0393254151\/ref=sr_1_1?ie=UTF8&amp;qid=1518445573&amp;sr=8-1&amp;keywords=the+quantum+spy<\/a> &#8211; (Paul Ihlenfeld)<\/p>\n<p><a href=\"https:\/\/www.nist.gov\/news-events\/news\/2017\/09\/physicist-who-working-accelerate-change-forensic-science\">https:\/\/www.nist.gov\/news-events\/news\/2017\/09\/physicist-who-working-accelerate-change-forensic-science<\/a> &#8211; (Oby Okereke)<\/p>\n<p><a href=\"https:\/\/commons.erau.edu\/cgi\/viewcontent.cgi?article=1201&amp;context=jdfsl\">https:\/\/commons.erau.edu\/cgi\/viewcontent.cgi?article=1201&amp;context=jdfsl<\/a> &#8211; (Brent Hladik)<\/p>\n<p><a href=\"https:\/\/www.dfcb.org\/DFCB_DFCB_Code_of_Ethics_and_Standards_of_Professional_Conduct_Version_1.1_Dec08.pdf\">https:\/\/www.dfcb.org\/DFCB_DFCB_Code_of_Ethics_and_Standards_of_Professional_Conduct_Version_1.1_Dec08.pdf<\/a>\u00a0&#8211; (Brent Hladik)<\/p>\n<p><a href=\"http:\/\/www.nextgov.com\/it-modernization\/2014\/07\/cloud-computing-complicates-digital-forensics-investigations\/89579\/\">http:\/\/www.nextgov.com\/it-modernization\/2014\/07\/cloud-computing-complicates-digital-forensics-investigations\/89579\/<\/a>\u00a0&#8211; (Brent Hladik)<\/p>\n<p><a href=\"http:\/\/cloudforensicsresearch.org\/\">cloudforensicsresearch.org\/ <\/a>&#8211; (Brent Hladik)<\/p>\n<p><a href=\"http:\/\/www.philly.com\/philly\/business\/court-dismisses-claim-that-government-illegally-hacked-computers-to-prosecute-child-porn-case-20180222.html\">http:\/\/www.philly.com\/philly\/business\/court-dismisses-claim-that-government-illegally-hacked-computers-to-prosecute-child-porn-case-20180222.html<\/a>\u00a0&#8211; (Paul Ihlenfeld)<\/p>\n<p><a href=\"http:\/\/www.lawtechjournal.com\/home\/articles\/619\/\">http:\/\/www.lawtechjournal.com\/home\/articles\/619\/<\/a>\u00a0 &#8211; (Brent Hladik)<\/p>\n<p><a href=\"https:\/\/www.reuters.com\/article\/us-usa-court-mobilephone\/u-s-supreme-court-to-settle-major-cellphone-privacy-case-idUSKBN18W1RY\">https:\/\/www.reuters.com\/article\/us-usa-court-mobilephone\/u-s-supreme-court-to-settle-major-cellphone-privacy-case-idUSKBN18W1RY<\/a>\u00a0 &#8211; (Brent Hladik)<\/p>\n<p><a href=\"http:\/\/logikcull.com\/why-end-ediscovery\">http:\/\/logikcull.com\/why-end-ediscovery<\/a>\u00a0&#8211; (Brent Hladik)<\/p>\n<p><a href=\"https:\/\/www.americanbar.org\/content\/dam\/aba\/publications\/law_practice_today\/breaking-into-e-discovery.authcheckdam.pdf\">https:\/\/www.americanbar.org\/content\/dam\/aba\/publications\/law_practice_today\/breaking-into-e-discovery.authcheckdam.pdf <\/a>\u00a0&#8211; (Brent Hladik)<\/p>\n<p><a href=\"http:\/\/www.lawtechnologytoday.org\/2014\/09\/challenges-of-mobile-devices-byod-and-ediscovery\/\">http:\/\/www.lawtechnologytoday.org\/2014\/09\/challenges-of-mobile-devices-byod-and-ediscovery\/<\/a> &#8211; (Satwika Balakrishnan)<\/p>\n<p>National institute of Justice publications on Cybercrime &#8211; few of them are really interesting &#8211; NIJ is the research, development and evaluation agency of the U.S. Department of Justice. We accomplish our <a href=\"https:\/\/www.nij.gov\/about\/Pages\/welcome.aspx\">mission<\/a> through the &#8220;Listen, Learn, Inform&#8221; model \u2014 we &#8220;listen&#8221; to the needs of the field; &#8220;learn&#8221; ways to meet those needs by funding research, development, and evaluation projects; and then &#8220;inform&#8221; the field of what we learned.<\/p>\n<p><a href=\"https:\/\/www.nij.gov\/publications\/pages\/publication-list.aspx?tags=Electronic%20Crime%20-%20Cybercrime\">https:\/\/www.nij.gov\/publications\/pages\/publication-list.aspx?tags=Electronic%20Crime%20-%20Cybercrime<\/a><\/p>\n<p><a href=\"https:\/\/www.nij.gov\/topics\/forensics\/evidence\/digital\/Pages\/welcome.aspx\">https:\/\/www.nij.gov\/topics\/forensics\/evidence\/digital\/Pages\/welcome.aspx\u00a0<\/a>&#8211; (Jayapreethi Selvaraju)<\/p>\n<p>The journal of Digital Forensics, security and law\u00a0<a href=\"https:\/\/commons.erau.edu\/jdfsl\/\">https:\/\/commons.erau.edu\/jdfsl\/<\/a> &#8211; (Jayapreethi Selvaraju)<\/p>\n<p>Podcasts on digital forensics:\u00a0<a href=\"http:\/\/www.digitalforensicsassociation.org\/podcasts\/\">http:\/\/www.digitalforensicsassociation.org\/podcasts\/<\/a> &#8211; (Jayapreethi Selvaraju)<\/p>\n<p>Computer Forensics from Lynda.com: (Mustafa Aydin)<\/p>\n<ul>\n<li><a href=\"https:\/\/www.lynda.com\/Developer-tutorials\/Computer-Forensics-Essential-Training\/170337-2.html\">https:\/\/www.lynda.com\/Developer-tutorials\/Computer-Forensics-Essential-Training\/170337-2.html<\/a><\/li>\n<li><a href=\"https:\/\/www.lynda.com\/Developer-tutorials\/Computer-forensics-tools\/170337\/186813-4.html\">https:\/\/www.lynda.com\/Developer-tutorials\/Computer-forensics-tools\/170337\/186813-4.html<\/a><\/li>\n<li><a href=\"https:\/\/www.lynda.com\/Security-tutorials\/Computer-Security-Investigation-Response\/419360-2.html\">https:\/\/www.lynda.com\/Security-tutorials\/Computer-Security-Investigation-Response\/419360-2.html<\/a><\/li>\n<li><a href=\"https:\/\/www.lynda.com\/Wireshark-tutorials\/Wireshark-Malware-Forensics\/624305-2.html\">https:\/\/www.lynda.com\/Wireshark-tutorials\/Wireshark-Malware-Forensics\/624305-2.html<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.ftc.gov\/system\/files\/documents\/plain-language\/pdf-0154_data-breach-response-guide-for-business.pdf\">https:\/\/www.ftc.gov\/system\/files\/documents\/plain-language\/pdf-0154_data-breach-response-guide-for-business.pdf\u00a0<\/a>&#8211; (Brent Hladik)<\/p>\n<p><a href=\"https:\/\/www.brookings.edu\/wp-content\/uploads\/2016\/07\/Patient-Privacy504v3.pdf\">https:\/\/www.brookings.edu\/wp-content\/uploads\/2016\/07\/Patient-Privacy504v3.pdf<\/a> &#8211; (Brent Hladik)<\/p>\n<p><a href=\"https:\/\/www.isaca.org\/Knowledge-Center\/Research\/ResearchDeliverables\/Pages\/overview-of-digital-forensics.aspx\">https:\/\/www.isaca.org\/Knowledge-Center\/Research\/ResearchDeliverables\/Pages\/overview-of-digital-forensics.aspx<\/a> &#8211; (Ahmed Alkaysi)<\/p>\n<p><strong>Who\u2019s Reading Your Email? &#8211;\u00a0<\/strong><a href=\"https:\/\/www.insidehighered.com\/news\/2018\/04\/02\/unauthorized-searches-professors-email-create-rift-rochester?utm_source=Inside+Higher+Ed&amp;utm_campaign=4167f5c7f9-DNU20180111&amp;utm_medium=email&amp;utm_term=0_1fcbc04421-4167f5c7f9-197578045&amp;mc_cid=4167f5c7f9&amp;mc_eid=d362591d16\">https:\/\/www.insidehighered.com\/news\/2018\/04\/02\/unauthorized-searches-professors-email-create-rift-rochester?utm_source=Inside+Higher+Ed&amp;utm_campaign=4167f5c7f9-DNU20180111&amp;utm_medium=email&amp;utm_term=0_1fcbc04421-4167f5c7f9-197578045&amp;mc_cid=4167f5c7f9&amp;mc_eid=d362591d16<\/a>\u00a0&#8211; (Sue Banka Temple ITS)<\/p>\n<h5 class=\"asset-name entry-title\">CERT Definition of &#8216;Insider Threat&#8217; &#8211; Updated &#8211; <a href=\"https:\/\/insights.sei.cmu.edu\/insider-threat\/2017\/03\/cert-definition-of-insider-threat---updated.html\">https:\/\/insights.sei.cmu.edu\/insider-threat\/2017\/03\/cert-definition-of-insider-threat&#8212;updated.html<\/a> &#8211; (LB)<\/h5>\n<p>Risk Management program around insider threats, from educating the employees to the controls around certain areas mapped to standards such as NIST.<\/p>\n<p><a href=\"https:\/\/resources.sei.cmu.edu\/asset_files\/TechnicalReport\/2012_005_001_34033.pdf\">https:\/\/resources.sei.cmu.edu\/asset_files\/TechnicalReport\/2012_005_001_34033.pdf <\/a>&#8211; (Ahmed Alkaysi)<\/p>\n<p>Interesting recent news info on the Ransomeware attack on city of Atlanta&#8230;\u00a0<a href=\"http:\/\/www.foxnews.com\/tech\/2018\/03\/29\/atlanta-still-battling-effects-ransomware-attack-experts-says-hack-should-be-national-wakeup-call.html\">http:\/\/www.foxnews.com\/tech\/2018\/03\/29\/atlanta-still-battling-effects-ransomware-attack-experts-says-hack-should-be-national-wakeup-call.html &#8211;\u00a0<\/a>(Paul\u00a0Ihlenfeld)<\/p>\n<p>Study of Latest Emerging Trends on Cyber Security and its challenges to Society<\/p>\n<p><a href=\"https:\/\/www.ijser.org\/researchpaper\/Study-of-Latest-Emerging-Trends-on-Cyber-Security-and-its-challenges-to-Society.pdf\">https:\/\/www.ijser.org\/researchpaper\/Study-of-Latest-Emerging-Trends-on-Cyber-Security-and-its-challenges-to-Society.pdf<\/a> \u2013 (Brent Hladik)<\/p>\n<p>Vulnerability of IT Infrastructures: Internal and External Threats<\/p>\n<p><a href=\"https:\/\/pdfs.semanticscholar.org\/873d\/522c5294ef5575ee26ef4b5bafba6784a4e3.pdf\">https:\/\/pdfs.semanticscholar.org\/873d\/522c5294ef5575ee26ef4b5bafba6784a4e3.pdf<\/a> \u2013 (Brent Hladik)<\/p>\n<p>A Threat-Driven Approach to Cyber Security<\/p>\n<p><a href=\"https:\/\/lockheedmartin.com\/content\/dam\/lockheed\/data\/isgs\/documents\/Threat-Driven%20Approach%20whitepaper.pdf\">https:\/\/lockheedmartin.com\/content\/dam\/lockheed\/data\/isgs\/documents\/Threat-Driven%20Approach%20whitepaper.pdf<\/a> \u2013 (Brent Hladik)<\/p>\n<p>INSIDER THREAT BEST PRACTICES GUIDE, 2ND EDITION<\/p>\n<p><a href=\"https:\/\/www.sifma.org\/wp-content\/uploads\/2018\/02\/insider-threat-best-practices-guide.pdf\">https:\/\/www.sifma.org\/wp-content\/uploads\/2018\/02\/insider-threat-best-practices-guide.pdf<\/a> \u00a0\u2013 (Brent Hladik)<\/p>\n<p>Challenges of Cloud Forensics: A Survey of the Missing Capabilities<\/p>\n<p><a href=\"https:\/\/ercim-news.ercim.eu\/en90\/special\/challenges-of-cloud-forensics-a-survey-of-the-missing-capabilities\">https:\/\/ercim-news.ercim.eu\/en90\/special\/challenges-of-cloud-forensics-a-survey-of-the-missing-capabilities<\/a> &#8211; (Ahmed Alkaysi)<\/p>\n<p>Data privacy: What your employees don\u2019t know but should<\/p>\n<p><a href=\"https:\/\/www.cio.com\/article\/3261946\/privacy\/data-privacy-what-your-employees-dont-know-but-should.html\">https:\/\/www.cio.com\/article\/3261946\/privacy\/data-privacy-what-your-employees-dont-know-but-should.html<\/a> &#8211; (Neil Rushi)<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Class and Study Material Weekly Videos https:\/\/foxcapture.temple.edu\/Mediasite\/Catalog\/catalogs\/sp18mis5170002 3\/20 WebEx Only recording (Snow Day) &#8211;\u00a0https:\/\/templeuniversity.webex.com\/templeuniversity\/ldr.php?RCID=5d85fcd4e5ad9192793ca9fd57883d92 Week Objectives&#8230; Week 1 Forensic Objectives Week 2 Forensic Objectives Week 3 Forensic Objectives Week 4 Forensic Objectives Week 6 Forensic Objectives Week 7 Forensic Objectives Week 8 Forensic Objectives Week 9 Forensic Objectives Week 11 Forensic Objectives Week 12 Forensic [&hellip;]<\/p>\n","protected":false},"author":6342,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-3104","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/wp-json\/wp\/v2\/pages\/3104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/wp-json\/wp\/v2\/users\/6342"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/wp-json\/wp\/v2\/comments?post=3104"}],"version-history":[{"count":32,"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/wp-json\/wp\/v2\/pages\/3104\/revisions"}],"predecessor-version":[{"id":3254,"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/wp-json\/wp\/v2\/pages\/3104\/revisions\/3254"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sec702sp2018\/wp-json\/wp\/v2\/media?parent=3104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}