收藏 分享(赏)

ASTM_E_2678_-_09_2014.pdf

上传人:益****师 文档编号:173920 上传时间:2023-03-04 格式:PDF 页数:20 大小:207.85KB
下载 相关 举报
ASTM_E_2678_-_09_2014.pdf_第1页
第1页 / 共20页
ASTM_E_2678_-_09_2014.pdf_第2页
第2页 / 共20页
ASTM_E_2678_-_09_2014.pdf_第3页
第3页 / 共20页
ASTM_E_2678_-_09_2014.pdf_第4页
第4页 / 共20页
ASTM_E_2678_-_09_2014.pdf_第5页
第5页 / 共20页
ASTM_E_2678_-_09_2014.pdf_第6页
第6页 / 共20页
亲,该文档总共20页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、Designation:E267809(Reapproved 2014)Standard Guide forEducation and Training in Computer Forensics1This standard is issued under the fixed designation E2678;the number immediately following the designation indicates the year oforiginal adoption or,in the case of revision,the year of last revision.A

2、number in parentheses indicates the year of last reapproval.Asuperscript epsilon()indicates an editorial change since the last revision or reapproval.1.Scope1.1 This guide will improve and advance computer foren-sics through the development of model curricula consistentwith other forensic science pr

3、ograms.1.2 Section 4 describes the alternative paths by whichstudents may arrive at and move through their professionaltraining.Sections 5 through 7 cover formal educational pro-grams in order of increasing length:a two-year associatedegree,a four-year baccalaureate degree,and graduate degrees.Secti

4、on 8 provides a framework for academic certificateprograms offered by educational institutions.Section 9 outlinesmodel criteria and implementation approaches for training andcontinuing education opportunities provided by professionalorganizations,vendors,and academic institutions.1.3 Some profession

5、al organizations recognize computerforensics,forensic audio,video,and image analysis as subdis-ciplines of computer forensics.However,the curricula andspecific educational training requirements of subdisciplinesother than computer forensics are beyond the scope of thisguide.1.4 This standard does no

6、t purport to address all of thesafety concerns,if any,associated with its use.It is theresponsibility of the user of this standard to establish appro-priate safety and health practices and determine the applica-bility of regulatory limitations prior to use.2.Terminology2.1 Definitions of Terms Speci

7、fic to This Standard:2.1.1 assembler,nsoftware that translates a low-levelprogram into a form that can be executed by a computer.2.1.2 capstone project,ndesign and implementation-oriented project typically completed during the final year of adegree program that requires students to apply and integra

8、teknowledge and skills gained from several courses.2.1.3 central processing unit(CPU),ncomputer chip thatinterprets commands and runs programs.2.1.4 compiler,nsoftware that translates a high-levelprogram into a form that can be executed by a computer.2.1.5 digital forensics,nscience of identifying,c

9、ollecting,preserving,documenting,examining,and analyzing evidencefrom computer systems,the results of which may be reliedupon in court.2.1.6 cryptography,nusing the sciences of encryption totransform data to hide its information content and decryption torestore the information to its original form.2

10、.1.7 data fusion,nprocess of associating,correlating,andcombining data and information from single and multiplesources.2.1.8 debugger,nsoftware that is used to find faults inprograms.2.1.9 demultiplexing,vprocess of isolating individual im-ages from a video flow.2.1.10 digital evidence,ninformation

11、of probative valuethat is stored or transmitted in binary form that may be reliedupon in court.2.1.11 computer forensics,nscience of identifying,collecting,preserving,documenting,examining,and analyzingevidence from computer systems,networks,and other elec-tronic devices,the results of which may be

12、relied upon in court.2.1.12 distributed denial of service(DDoS),nintentionalparalyzing of a computer or a computer network by flooding itwith data sent simultaneously from many locations.2.1.13 Electronic Communications Privacy Act(ECPA),nregulates interception of wire and electronic communica-tions

13、(18 USC 2510 et seq.)and retrieval of stored wire andelectronic communications(18 USC 2701 et seq.).2.1.14 embedded device,nspecial-purpose computer sys-tem that is completely encapsulated by the device it controls.2.1.15 enterprise system,ncomputer systems or networksor both integral to the operati

14、on of a company or large entity,possibly global in scope.2.1.16 ext2/ext3(Linux-extended 2/Linux-extended 3)filesystem,nfile system typically used with Linux-based oper-ating systems.2.1.17 file allocation table(FAT)file system,noriginal filesystem used with Microsoft and IBM-compatible operatingsys

15、tems still in common use.1This guide is under the jurisdiction of ASTM Committee E30 on ForensicSciences and is the direct responsibility of Subcommittee E30.12 on Digital andMultimedia Evidence.Current edition approved Oct.1,2014.Published October 2014.Originallyapproved in 2009.Last previous editi

16、on approved in 2009 as E2678 09.DOI:10.1520/E2678-09R14.Copyright ASTM International,100 Barr Harbor Drive,PO Box C700,West Conshohocken,PA 19428-2959.United States1 2.1.18 intrusion detection system(IDS),nsoftware orhardware that are used to identify attacks or anomalies oncomputers or networks or both.2.1.19 link analysis,ntype of analysis often used by lawenforcement that uses visual or other means of showingrelationships between people,places,events,and things bylinking them through timeline

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 专业资料 > 国外标准

copyright@ 2008-2023 wnwk.com网站版权所有

经营许可证编号:浙ICP备2024059924号-2