ASTM E2678-2009 Standard Guide for Education and Training in Computer Forensics《计算机取证的教育和培训的标准指导办法》.pdf
《ASTM E2678-2009 Standard Guide for Education and Training in Computer Forensics《计算机取证的教育和培训的标准指导办法》.pdf》由会员分享,可在线阅读,更多相关《ASTM E2678-2009 Standard Guide for Education and Training in Computer Forensics《计算机取证的教育和培训的标准指导办法》.pdf(20页珍藏版)》请在麦多课文档分享上搜索。
1、Designation: E 2678 09Standard Guide forEducation and Training in Computer Forensics1This standard is issued under the fixed designation E 2678; the number immediately following the designation indicates the year oforiginal adoption or, in the case of revision, the year of last revision. A number in
2、 parentheses indicates the year of last reapproval. Asuperscript epsilon () indicates an editorial change since the last revision or reapproval.1. Scope1.1 This guide will improve and advance computer foren-sics through the development of model curricula consistentwith other forensic science program
3、s.1.2 Section 4 describes the alternative paths by whichstudents may arrive at and move through their professionaltraining. Sections 5 through 7 cover formal educational pro-grams in order of increasing length: a two- year associatedegree, a four-year baccalaureate degree, and graduate degrees.Secti
4、on 8 provides a framework for academic certificateprograms offered by educational institutions. Section 9 outlinesmodel criteria and implementation approaches for training andcontinuing education opportunities provided by professionalorganizations, vendors, and academic institutions.1.3 Some profess
5、ional organizations recognize computerforensics, forensic audio, video, and image analysis as subdis-ciplines of computer forensics. However, the curricula andspecific educational training requirements of subdisciplinesother than computer forensics are beyond the scope of thisguide.1.4 This standard
6、 does not purport to address all of thesafety concerns, if any, associated with its use. It is theresponsibility of the user of this standard to establish appro-priate safety and health practices and determine the applica-bility of regulatory limitations prior to use.2. Terminology2.1 Definitions of
7、 Terms Specific to This Standard:2.1.1 assembler, nsoftware that translates a low-levelprogram into a form that can be executed by a computer.2.1.2 capstone project, ndesign and implementation-oriented project typically completed during the final year of adegree program that requires students to app
8、ly and integrateknowledge and skills gained from several courses.2.1.3 central processing unit (CPU), ncomputer chip thatinterprets commands and runs programs.2.1.4 compiler, nsoftware that translates a high- levelprogram into a form that can be executed by a computer.2.1.5 digital forensics, nscien
9、ce of identifying, collecting,preserving, documenting, examining, and analyzing evidencefrom computer systems, the results of which may be reliedupon in court.2.1.6 cryptography, nusing the sciences of encryption totransform data to hide its information content and decryption torestore the informati
10、on to its original form.2.1.7 data fusion, nprocess of associating, correlating,and combining data and information from single and multiplesources.2.1.8 debugger, nsoftware that is used to find faults inprograms.2.1.9 demultiplexing, vprocess of isolating individual im-ages from a video flow.2.1.10
11、digital evidence, ninformation of probative valuethat is stored or transmitted in binary form that may be reliedupon in court.2.1.11 computer forensics, nscience of identifying, col-lecting, preserving, documenting, examining, and analyzingevidence from computer systems, networks, and other elec-tro
12、nic devices, the results of which may be relied upon in court.2.1.12 distributed denial of service (DDoS), nintentionalparalyzing of a computer or a computer network by flooding itwith data sent simultaneously from many locations.2.1.13 Electronic Communications Privacy Act (ECPA),nregulates interce
13、ption of wire and electronic communica-tions (18 USC 2510 et seq.) and retrieval of stored wire andelectronic communications (18 USC 2701 et seq.)2.1.14 embedded device, nspecial-purpose computer sys-tem that is completely encapsulated by the device it controls.2.1.15 enterprise system, ncomputer sy
14、stems or networksor both integral to the operation of a company or large entity,possibly global in scope.2.1.16 ext2/ext3 (Linux-extended 2/Linux-extended 3) filesystem, nfile system typically used with Linux-based oper-ating systems.1This guide is under the jurisdiction of ASTM Committee E30 on For
15、ensicSciences and is the direct responsibility of Subcommittee E30.12 on Digital andMultimedia Evidence.Current edition approved June 15, 2009. Published August 2009.1Copyright ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959, United States.2.1.17 file allocat
16、ion table (FAT) file system, noriginal filesystem used with Microsoft and IBM-compatible operatingsystems still in common use.2.1.18 intrusion detection system (IDS), nsoftware orhardware that are used to identify attacks or anomalies oncomputers or networks or both.2.1.19 link analysis, ntype of an
17、alysis often used by lawenforcement that uses visual or other means of showingrelationships between people, places, events, and things bylinking them through timelines, telephone calls, emails, or anyother consistent scheme.2.1.20 local area network (LAN), ncomputer networkcovering a local area such
18、 as a home, office, or small group ofbuildings, such as a college.2.1.21 malware, nmalicious software designed to causeunexpected and frequently undesirable actions on a system (forexample, viruses, worms, spyware, or Trojan horses).2.1.22 mock trial, noften referred to as “moot court,”role-playing
19、court proceedings intended to prepare students forcourtroom testimony.2.1.23 new technology file system (NTFS), nadvanced filesystem with security features commonly used with the Win-dows and all subsequent sytems.2.1.24 open system interconnect (OSI), nlayered modelthat describes the way computers
20、communicate on a network.2.1.25 personal area network (PAN), nnetworkingscheme that enables computers and other electronic devices tocommunicate with each other over short distances either withor without wires.2.1.26 partitioning, vsoftware method of dividing aphysical hard drive into logical contai
21、ners that will appear asmultiple logical drives.2.1.27 peer to peer (P2P), ncommunications network thatallows multiple computers to share files.2.1.28 personal electronic device (PED), nconsumerelectronic device that is typically mobile or handheld (forexample, personal digital assistant (PDA), cell
22、 phone, oriPOD).2.1.29 photogrammetry, nscience of obtaining dimen-sional information of items depicted in photographs.2.1.30 public key infrastructure (PKI), nsystem that usesencryption to verify and authenticate network transactions.2.1.31 random access memory (RAM), ncomputers read/write memory;
23、it provides temporary memory space for thecomputer to process data.2.1.32 redundant array of inexpensive/independent disks(RAID), nsystem that uses two or more drives in combina-tion for fault tolerance or performance.2.1.33 steganography, ntechnique for embedding infor-mation into something else, s
24、uch as a text file in an image or asound file, for the sole purpose of hiding the existence of theembedded information.2.1.34 thumb drive, nsmall digital storage device thatuses flash memory and a universal serial bus (USB) connectionto interface with a computer.2.1.35 topology, nphysical layout or
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ASTME26782009STANDARDGUIDEFOREDUCATIONANDTRAININGINCOMPUTERFORENSICS 计算机 取证 教育 培训 标准 指导 办法 PDF

链接地址:http://www.mydoc123.com/p-531677.html