ASTM E2678-2009(2014) Standard Guide for Education and Training in Computer Forensics《计算机取证的教育和培训的标准指南》.pdf
《ASTM E2678-2009(2014) Standard Guide for Education and Training in Computer Forensics《计算机取证的教育和培训的标准指南》.pdf》由会员分享,可在线阅读,更多相关《ASTM E2678-2009(2014) Standard Guide for Education and Training in Computer Forensics《计算机取证的教育和培训的标准指南》.pdf(20页珍藏版)》请在麦多课文档分享上搜索。
1、Designation: E2678 09 (Reapproved 2014)Standard Guide forEducation and Training in Computer Forensics1This standard is issued under the fixed designation E2678; the number immediately following the designation indicates the year oforiginal adoption or, in the case of revision, the year of last revis
2、ion. A number in parentheses indicates the year of last reapproval. Asuperscript epsilon () indicates an editorial change since the last revision or reapproval.1. Scope1.1 This guide will improve and advance computer foren-sics through the development of model curricula consistentwith other forensic
3、 science programs.1.2 Section 4 describes the alternative paths by whichstudents may arrive at and move through their professionaltraining. Sections 5 through 7 cover formal educational pro-grams in order of increasing length: a two- year associatedegree, a four-year baccalaureate degree, and gradua
4、te degrees.Section 8 provides a framework for academic certificateprograms offered by educational institutions. Section 9 outlinesmodel criteria and implementation approaches for training andcontinuing education opportunities provided by professionalorganizations, vendors, and academic institutions.
5、1.3 Some professional organizations recognize computerforensics, forensic audio, video, and image analysis as subdis-ciplines of computer forensics. However, the curricula andspecific educational training requirements of subdisciplinesother than computer forensics are beyond the scope of thisguide.1
6、.4 This standard does not purport to address all of thesafety concerns, if any, associated with its use. It is theresponsibility of the user of this standard to establish appro-priate safety and health practices and determine the applica-bility of regulatory limitations prior to use.2. Terminology2.
7、1 Definitions of Terms Specific to This Standard:2.1.1 assembler, nsoftware that translates a low-levelprogram into a form that can be executed by a computer.2.1.2 capstone project, ndesign and implementation-oriented project typically completed during the final year of adegree program that requires
8、 students to apply and integrateknowledge and skills gained from several courses.2.1.3 central processing unit (CPU), ncomputer chip thatinterprets commands and runs programs.2.1.4 compiler, nsoftware that translates a high- levelprogram into a form that can be executed by a computer.2.1.5 digital f
9、orensics, nscience of identifying, collecting,preserving, documenting, examining, and analyzing evidencefrom computer systems, the results of which may be reliedupon in court.2.1.6 cryptography, nusing the sciences of encryption totransform data to hide its information content and decryption toresto
10、re the information to its original form.2.1.7 data fusion, nprocess of associating, correlating, andcombining data and information from single and multiplesources.2.1.8 debugger, nsoftware that is used to find faults inprograms.2.1.9 demultiplexing, vprocess of isolating individual im-ages from a vi
11、deo flow.2.1.10 digital evidence, ninformation of probative valuethat is stored or transmitted in binary form that may be reliedupon in court.2.1.11 computer forensics, nscience of identifying,collecting, preserving, documenting, examining, and analyzingevidence from computer systems, networks, and
12、other elec-tronic devices, the results of which may be relied upon in court.2.1.12 distributed denial of service (DDoS), nintentionalparalyzing of a computer or a computer network by flooding itwith data sent simultaneously from many locations.2.1.13 Electronic Communications Privacy Act (ECPA),nreg
13、ulates interception of wire and electronic communica-tions (18 USC 2510 et seq.) and retrieval of stored wire andelectronic communications (18 USC 2701 et seq.).2.1.14 embedded device, nspecial-purpose computer sys-tem that is completely encapsulated by the device it controls.2.1.15 enterprise syste
14、m, ncomputer systems or networksor both integral to the operation of a company or large entity,possibly global in scope.2.1.16 ext2/ext3 (Linux-extended 2/Linux-extended 3) filesystem, nfile system typically used with Linux-based oper-ating systems.2.1.17 file allocation table (FAT) file system, nor
15、iginal filesystem used with Microsoft and IBM-compatible operatingsystems still in common use.1This guide is under the jurisdiction of ASTM Committee E30 on ForensicSciences and is the direct responsibility of Subcommittee E30.12 on Digital andMultimedia Evidence.Current edition approved Oct. 1, 201
16、4. Published October 2014. Originallyapproved in 2009. Last previous edition approved in 2009 as E2678 09. DOI:10.1520/E2678-09R14.Copyright ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United States12.1.18 intrusion detection system (IDS), nsoftware orha
17、rdware that are used to identify attacks or anomalies oncomputers or networks or both.2.1.19 link analysis, ntype of analysis often used by lawenforcement that uses visual or other means of showingrelationships between people, places, events, and things bylinking them through timelines, telephone ca
18、lls, emails, or anyother consistent scheme.2.1.20 local area network (LAN), ncomputer networkcovering a local area such as a home, office, or small group ofbuildings, such as a college.2.1.21 malware, nmalicious software designed to causeunexpected and frequently undesirable actions on a system (for
19、example, viruses, worms, spyware, or Trojan horses).2.1.22 mock trial, noften referred to as “moot court,”role-playing court proceedings intended to prepare students forcourtroom testimony.2.1.23 new technology file system (NTFS), nadvanced filesystem with security features commonly used with the Wi
20、n-dows and all subsequent sytems.2.1.24 open system interconnect (OSI), nlayered modelthat describes the way computers communicate on a network.2.1.25 personal area network (PAN), nnetworking schemethat enables computers and other electronic devices to com-municate with each other over short distanc
21、es either with orwithout wires.2.1.26 partitioning, vsoftware method of dividing a physi-cal hard drive into logical containers that will appear asmultiple logical drives.2.1.27 peer to peer (P2P), ncommunications network thatallows multiple computers to share files.2.1.28 personal electronic device
22、 (PED), nconsumer elec-tronic device that is typically mobile or handheld (for example,personal digital assistant (PDA), cell phone, or iPOD).2.1.29 photogrammetry, nscience of obtaining dimen-sional information of items depicted in photographs.2.1.30 public key infrastructure (PKI), nsystem that us
23、esencryption to verify and authenticate network transactions.2.1.31 random access memory (RAM), ncomputers read/write memory; it provides temporary memory space for thecomputer to process data.2.1.32 redundant array of inexpensive/independent disks(RAID), nsystem that uses two or more drives in comb
24、inationfor fault tolerance or performance.2.1.33 steganography, ntechnique for embedding infor-mation into something else, such as a text file in an image or asound file, for the sole purpose of hiding the existence of theembedded information.2.1.34 thumb drive, nsmall digital storage device that us
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ASTME267820092014STANDARDGUIDEFOREDUCATIONANDTRAININGINCOMPUTERFORENSICS 计算机 取证 教育 培训 标准 指南 PDF

链接地址:http://www.mydoc123.com/p-531678.html