AccessData To Host Digital Forensics Lab At Cybersecurity Camp For Girls

AccessData Group, a leading provider of integrated digital forensics and e-discovery software, will host hands-on labs to educate students about digital forensics at the 2017 GenCyber: Girls in CybHER Security camp at Dakota State University (DSU).DSU’s third annual girls camp, which will be held June 25-29, 2017, is the largest residential girls-only camp in the nation, hosting 135 girls in 7th, 8th and 9th grades. “The girls will learn about programming, networking, security and forensics, from DSU faculty and special guests,” said Dr. Ashley Podhradsky, associate professor of Digital Forensics and Information Assurance.

AccessData, Citi and Google are among the event sponsors who will be providing expert speakers to teach various sessions throughout the camp.

“Digital forensics is an essential component of cybersecurity, so it’s important the students receive some hands-on training in how we collect and process electronic evidence,” said Keith Lockhart, vice president of global training at AccessData. “This camp is a terrific opportunity to not only introduce these young ladies to the possibility of careers in this growing field, but also to help them better understand how to keep themselves safe when using the internet. AccessData is delighted to partner with Dakota State and GenCyber so the students can learn more about our industry and the role of technology as a force of good in our digital world.”

GenCyber is a unique program created by the National Security Agency and the National Science Foundation that consists of camps in locations across the U.S. The GenCyber program is designed to increase interest in cybersecurity careers and diversity in the cybersecurity workforce, help students understand correct and safe on-line behavior, and improve teaching methods for delivering cybersecurity content for K-12 programs. Through grants from the NSA and NSF, along with other sponsors, the camps are free for participants.

Get The Latest DFIR News!

Top DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

Dakota State has a broad national reputation for providing a dynamic, technology-rich learning and research environment for its students, and for others through outreach programs such as the GenCyber camps. They will also be hosting two co-ed cyber camps and a teachers’ cyber camp this summer. For more information on the GenCyber Girls in CybHER Security camp, please go to www.gencybergirls.camp. For more information on Dakota State University’s cyber programs visit dsucyber.com, or dsu.edu.

About AccessData

Whether it’s for investigation, litigation or compliance, AccessData® offers industry-leading solutions that put the power of forensics in your hands. For 30 years, AccessData has worked with more than 130,000 customers in law enforcement, government agencies, corporations and law firms around the world, providing both stand-alone and enterprise-class solutions that can synergistically work together. The company is backed by Sorenson Capital, a leading private equity firm focused on high-growth portfolios. For more information on AccessData, please go to www.accessdata.com.

About Dakota State University

Dakota State University is a public university located in Madison, South Dakota, part of the State of South Dakota Regental system of specialized schools and universities. Founded in 1881 as a teacher’s college, it maintains that heritage mission, while also carrying out its signature mission of technology-infused and technology-intensive degrees. It has grown rapidly in national recognition as a technology-forward school, and has significant partnerships with the U.S. National Security Agency and the Department of Homeland Security, among others, for DSU’s cyber security-related programs. For more information, please contact Jane Utecht, Strategic Communications Coordinator at [email protected], 605-256-5027. The DSU website is http://www.dsu.edu.

Leave a Comment

Latest Videos

Quantifying Data Volatility for IoT Forensics With Examples From Contiki OS

Forensic Focus 22nd June 2022 5:00 am

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run. 

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems. 

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run.

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems.

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_i0zd7HtluzY

A Systematic Approach to Understanding MACB Timestamps on Unixlike Systems

Forensic Focus 21st June 2022 5:00 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...