Advertisement

Developing Hands-On Laboratory Works for the “Information Security Incident Management” Discipline

  • Natalia MiloslavskayaEmail author
  • Alexander Tolstoy
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 531)

Abstract

The paper presents our recent experience in developing the hands-on laboratory works for the “Business Continuity and Information Security Maintenance” Master’s Degree programme in the framework of the NRNU MEPhI’s “Network Security Intelligence” Educational and Research Center (NSIC). These labs are designed for the “Information Security Incident Management” discipline to provide training on information security (IS) incident practical and actionable response, in particular its investigation on the basis of computer forensic approaches and specialized tools being used for these purposes. The main areas of further improvement of these labs conclude the paper.

Keywords

Information security incident Online banking services Money transfer Hands-on laboratory work Computer forensics 

Notes

Acknowledgement

This work was supported by the MEPhI Academic Excellence Project (agreement with the Ministry of Education and Science of the Russian Federation of August 27, 2013, project no. 02.a03.21.0005).

References

  1. 1.
    ISO/IEC 27000:2016 Information technology – Security techniques – Information security management systems – Overview and vocabularyGoogle Scholar
  2. 2.
    Bank of Russia Standard STO BR IBBS-1.3-2016 “Maintenance of Information Security of the Russian Banking System Organizations. Collection and Analysis of Technical Data When Responding to Information Security Incidents during Money Transfer”Google Scholar
  3. 3.
    Miloslavskaya, N., Tolstoy, A., Migalin, A.: “Network Security Intelligence” educational and research center. In: Bishop, M., Futcher, L., Miloslavskaya, N., Theocharidou, M. (eds.) WISE 2017. IAICT, vol. 503, pp. 157–168. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-58553-6_14CrossRefGoogle Scholar
  4. 4.
    Yasinsac, A., Erbacher, R.F., Marks, D.G., Pollitt, M.M., Sommer, P.M.: Computer forensics education. IEEE Secur. Priv. 1(4), 15–23 (2003)CrossRefGoogle Scholar
  5. 5.
    McGuire, T.J., Murff, K.N.: Issues in the development of a digital forensics curriculum. J. Comput. Sci. Coll. 22(2), 274–280 (2006)Google Scholar
  6. 6.
    Batten, L., Pan, L.: Teaching digital forensics to undergraduate students. IEEE Secur. Priv. 6(3), 54–56 (2008)CrossRefGoogle Scholar
  7. 7.
    Wassenaar, D., Woo, D., Wu, P.: A certificate program in computer forensics. J. Comput. Sci. Coll. 24(4), 158–167 (2009)Google Scholar
  8. 8.
    Digital intelligence computer forensics training. https://www.digitalintelligence.com/forensictraining.php. Accessed 22 June 2018
  9. 9.
    InfoSec institute’s authorized computer forensics boot camp. https://www.infosecinstitute.com/courses/. Accessed 22 June 2018
  10. 10.
    Computer and hacking forensics. https://www.cybrary.it/course/computer-hacking-forensics-analyst/. Accessed 22 June 2018
  11. 11.
    Scott, S.: Implementing a digital forensics lab in education. http://www.in-fosecwriters.com/Papers/SScott_Forensics_Lab_in_Education.pdf. Accessed 22 June 2018
  12. 12.
    Lawrence, K., Chi, H.: Framework for the design of web-based learning for digital forensics labs. In: Proceedings of the 47th Annual ACM Southeast Regional Conference, 19–21 March 2009, Clemson, SC (2009)Google Scholar
  13. 13.
    Floyd, K., Yerby, J.: Development of a digital forensics lab to support active learning. In: Southern Association for Information Systems (SAIS) 2014 Proceedings (2014)Google Scholar
  14. 14.
    DFIR Training & Courses. https://digital-forensics.sans.org/training. Accessed 22 June 2018
  15. 15.
    Forensic Tool Kit. http://accessdata.com/training. Accessed 22 June 2018
  16. 16.
    List of free online computer forensics courses and classes. https://study.com/articles/List_of_Free_Online_Computer_Forensics_Courses_and_Classes.html. Accessed 22 June 2018
  17. 17.
    Manson, D., Carlin, A., Ramos, S., Gyger, A., Kaufman, M., Treichelt, J.: Is the open way a better way? Digital forensics using open source tools. In: Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS 2007), p. 266, 3–6 January 2007, Waikoloa, Big Island, Hawaii, USA. IEEE Computer Society (2007)Google Scholar
  18. 18.
    Austin, R.D.: Digital forensics on the cheap: teaching forensics using open source tools. In: Proceedings of the 4th Annual Conference on Information Security Curriculum Development (InfoSecCD 2007), pp. 1–5, 28 September 2007, Kennesaw, Georgia. ACM (2007)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2018

Authors and Affiliations

  1. 1.The National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)MoscowRussia

Personalised recommendations