Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Forensic analysts collect, preserve, and analyze digital evidence during the course of an investigation. Forensics includes but is not limited to system and user behaviour, file system content, communication patterns etc. There are a lot of techniques and tools out there, which can help to investigate on an suspicious activity within the system. The trainings should help system and network admins to doing their day to day business with the safeness on board to being wapponed against threads coming from the outside world.

 

Incident response and analysis

Any outward facing service provides a potential attack surface. Incidents should be expected by users, administrators and response teams. Proper response and analysis is critical to reduce continued risk. All levels of an E-Infrastructure should know exactly how to handle an incident. This starts with what to do with the service in question to preserve important forensic information, who to contact in event of a breach or attack, how to limit unfavorable consequences, and how to notify the community of the incident. This will also include contacting collaborating E-Infrastructures to be sure they are not also affected by the breach or attack.

 

Training should focus on properly handling security events.

...

E-infrastructures should also look into prevention against complex incidents and take basic measures such as power backup, fire prevention and suppression systems, lightning protection and where applicable protection against natural disasters like earthquakes and floodings.

 OrganisationOrganisation, roles, responsibilities (generic introduction)

...

Trainings of different kinds could be offered starting from AAI in local organizations up to management platforms for collaborative environments. The traing should investigate on those areas and provide the participant with hands-on information. how to set-up those AAI infrastructures.

 Systems Systems design

 

 IT IT security awareness for users 

...