ITS-CEC Cybersecurity Emerging Challenges

Scope:

  1. The emerging challenges in a computing-based discipline
    involving technology, people, information, and processes to
    enable assured operations and to support the growing need for
    forensic activities in a contest, adversarial environment.
  2. Security considerations of cloud computing
  3. Digital forensics including the recovery and investigation of
    material found in digital devices, often in relation to computer
    crime.
  4. Security implications for information technologies enabled and
    controlled by software and influenced by the supply chain.

Competencies:

  1. Perform malware analysis on a computer system and conduct a
    forensic analysis on a local network, on stored data within a
    system as well as mobile devices for an enterprise environment.
    (Malware and forensic analysis)
  2. Apply standards, procedures, and applications used to protect
    the confidentiality, integrity and availability of information and
    information system within a cloud computing setting. (System
    integrity)
  3. Analyze human facets that enable the exploitation of
    computing-based systems. (Human dynamics)
  4. Design security procedures, based on cybersecurity principles,
    regarding privacy issues for a computing-based system that
    address security challenges within a computing environment
    (e.g. internet of things). (Security procedures)

Subdomains and Core Hour allocation

Subdomain Level
ITS-CEC-01 Case studies and lessons learned 1
ITS-CEC-02 Network forensics 2
ITS-CEC-03 Stored data forensics 2
ITS-CEC-04 Mobile forensics 1
ITS-CEC-05 Cloud security 1
ITS-CEC-06 Security metrics 1
ITS-CEC-07 Malware analysis 1
ITS-CEC-08 Supply chain and software assurance 1
ITS-CEC-09 Personnel and human security 1
ITS-CEC-10 Social dimensions 1
ITS-CEC-11 Security implementations 1
ITS-CEC-12 Cyber-physical systems and the IoT 1

Suggestions Accepted for consideration for the next Edition:

Please provide your suggestions about this knowledge unit. All submitted comments will be reviewed at the end of the month. Comments accepted for inclusion will be listed above.

Leave a Reply

Your email address will not be published. Required fields are marked *