Scope:
- The emerging challenges in a computing-based discipline
involving technology, people, information, and processes to
enable assured operations and to support the growing need for
forensic activities in a contest, adversarial environment. - Security considerations of cloud computing
- Digital forensics including the recovery and investigation of
material found in digital devices, often in relation to computer
crime. - Security implications for information technologies enabled and
controlled by software and influenced by the supply chain.
Competencies:
- Perform malware analysis on a computer system and conduct a
forensic analysis on a local network, on stored data within a
system as well as mobile devices for an enterprise environment.
(Malware and forensic analysis) - Apply standards, procedures, and applications used to protect
the confidentiality, integrity and availability of information and
information system within a cloud computing setting. (System
integrity) - Analyze human facets that enable the exploitation of
computing-based systems. (Human dynamics) - Design security procedures, based on cybersecurity principles,
regarding privacy issues for a computing-based system that
address security challenges within a computing environment
(e.g. internet of things). (Security procedures)
Subdomains and Core Hour allocation
| Subdomain | Level |
| ITS-CEC-01 Case studies and lessons learned | 1 |
| ITS-CEC-02 Network forensics | 2 |
| ITS-CEC-03 Stored data forensics | 2 |
| ITS-CEC-04 Mobile forensics | 1 |
| ITS-CEC-05 Cloud security | 1 |
| ITS-CEC-06 Security metrics | 1 |
| ITS-CEC-07 Malware analysis | 1 |
| ITS-CEC-08 Supply chain and software assurance | 1 |
| ITS-CEC-09 Personnel and human security | 1 |
| ITS-CEC-10 Social dimensions | 1 |
| ITS-CEC-11 Security implementations | 1 |
| ITS-CEC-12 Cyber-physical systems and the IoT | 1 |
Suggestions Accepted for consideration for the next Edition:
Please provide your suggestions about this knowledge unit. All submitted comments will be reviewed at the end of the month. Comments accepted for inclusion will be listed above.