This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Visual Crime Scene and Security Incident Education Project"

From OWASP
Jump to: navigation, search
m (Project About)
m (Road Map and Getting Involved)
Line 91: Line 91:
 
= Road Map and Getting Involved =
 
= Road Map and Getting Involved =
  
<!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.-->
+
Project Process  - following UIDM development process. 
<span style="color:#ff0000">
+
A project roadmap is the envisioned plan for the project. The purpose of the roadmap is to help others understand where the project is going as well as areas that volunteers may contribute. It gives the community a chance to understand the context and the vision for the goal of the project. Additionally, if a project becomes inactive, or if the project is abandoned, a roadmap can help ensure a project can be adopted and continued under new leadership.
+
Pre-project  activities,  (UIDM stage 1) October – November 2014
Roadmaps vary in detail from a broad outline to a fully detailed project charter. Generally speaking, projects with detailed roadmaps have tended to develop into successful projects. Some details that leaders may consider placing in the roadmap include: envisioned milestones, planned feature enhancements, essential conditions, project assumptions, development timelines, etc. You are required to have at least 4 milestones for every year the project is active.
+
•​Initial user engagement with digital forensics
</span>
+
•​Confirm data protection procedures
==Roadmap==
+
Outputs: Data protection policy, ethical submission document.
As of <strong>November, 2013, the highest priorities for the next 6 months</strong> are:
+
<strong>
+
Work package one: Project set up and initial design (UIDM stage 1) December 2014 – February 2015
* Complete the first draft of the Code Project Template
+
•​Establish website and blogging area
* Get other people to review the Code Project Template and provide feedback
+
•​Identify digital forensic evidence and security incident requirements
* Incorporate feedback into changes in the Code Project Template
+
•​Develop pedagogic and evaluation criteria
* Finalize the Code Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project
+
•​Outline database and communication design
</strong>
+
•​Initial scenario and visitor centre
 
+
Outputs: Workshop 1 event and report 'Ethics and IPR', project blog and community engagement and communication site, Introduction and dissemination of demonstration application.
Subsequent Releases will add
+
<strong>
+
Work Package two: Prototype development (UIDM stage 2) March 2015 – May 2015
* Internationalization Support
+
•​Basic infrastructure implementation
* Additional Unit Tests
+
•​Implement reviewing and annotation to web application
* Automated Regression tests
+
•​Develop induction and user training materials
</strong>
+
•​Contact and enrol collaborating institutions
 
+
•​Enlist evaluation team and agree remit
==Getting Involved==
+
Outputs: Trial scenarios, prospective user support pack,
Involvement in the development and promotion of <strong>Code Project Template</strong> is actively encouraged!
+
You do not have to be a security expert or a programmer to contribute.
+
Work Package three:  System prototyping and initial feedback,  UIDM stages 2 /3, June 2015 – August 2015
Some of the ways you can help are as follows:
+
•​Detailed Design and implementation of controls and assets for configurable scenarios.
 
+
•​Evaluate basic infrastructure with respect to usability and learning
===Coding===
+
•​Additional scenario types (digital forensic evidence extraction, live data acquisition, )
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests
+
•​Students and staff users to test induction and usability 
 +
Outputs: tutor support pack, Initial evaluation report, Workshop 2 event and report : Applications of Virtual Digital Evidence Forensic Scenarios
 +
 +
Work Package four Technical development  (UIDM stage 3) September 2015 – November 2015
 +
•​Incorporate  feedback from users and external reviewers
 +
•​Development of richer scenarios with bots and pre-determined 'events'.
 +
•​Finalise user interface, control and reporting resources.
 +
•​Incorporate with forensics teaching
 +
Outputs: pedagogic evaluation report, Implementation technical report: Workshop 3 – Cyber Security Incident Workshop
 +
 +
Work Package five: Dissemination and Evaluation – UIDM stage 4, December 2015  - February 2016
 +
•​Evaluation and feedback from 5 selected institutions
 +
•​Incorporation of feedback into project
 +
Outputs: Final project report, Open access to service for users and collaborators
 +
Student and tutor induction and usage packs
 +
Case study  on embedding within digital forensic and cyber security teaching  at partner institutions
 +
Workshop 4 event and report: 'student and tutor experiences'
 +
Continuing development and usage plan,  technical and pedagogic collaboration packs
 +
Cumulative evaluation report with external evaluation feedback 
 +
Dissemination conference papers
 
===Localization===
 
===Localization===
 
Are you fluent in another language? Can you help translate the text strings in the <strong>Code Project Template</strong> into that language?
 
Are you fluent in another language? Can you help translate the text strings in the <strong>Code Project Template</strong> into that language?
Line 124: Line 143:
 
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.
 
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.
 
===Feedback===
 
===Feedback===
Please use the [https://lists.owasp.org/mailman/listinfo/OWASP_Code_Project_Template Code Project Template project mailing list] for feedback about:
+
Please use the [https://lists.owasp.org/mailman/listinfo/OWASP_Visual_Crime_Scene_and_Security_Incident_Education_Project  project mailing list] for feedback about:
 
<ul>
 
<ul>
 
<li>What do like?</li>
 
<li>What do like?</li>

Revision as of 18:01, 28 October 2014

OWASP Project Header.jpg

Introduction

The OWASP Virtual Crime Scene and Security Incident Education ProjecT will create an accessible, configurable, incident scene simulation for digital forensic and cyber security incident training within an e-learning framework.


Description

The OWASP Virtual Crime Scene and Security Incident Education Project will develop and evaluate pedagogic practice, catering for the needs of a diverse student base drawn from HEI, cyber security, forensic and crime enforcement professionals whilst providing a unrivaled gameification experience.

Scenarios, interactive objects and student transcripts will be accessed via a web interface to allow tutors to configure crime/incident scenes and provide feedback.

The project will be hosted on a cloud computing platform where participants can make contributions, share applications, use and evaluate resources; allowing wide community engagement with minimal investment in infrastructure.


Licensing

Apache 2.0

Project Resources

Mailing List virtual_world_design_and_requirements_documentation@lists.owasp.org

Project Leader

Adrian Winckles

Related Projects

Classifications

Project Type Files CODE.jpg
Incubator Project
Owasp-defenders-small.png
Affero General Public License 3.0

News and Events

This is where you can provide project updates, links to any events like conference presentations, Project Leader interviews, case studies on successful project implementations, and articles written about your project.

  • [18 Dec 2013] 1.0 Release Candidate is available for download. This release provides final bug fixes and product stabilization. Any feedback (good or bad) in the next few weeks would be greatly appreciated.
  • [20 Nov 2013] 1.0 Beta 2 Release is available for download. This release offers several bug fixes, a few performance improvements, and addressed all outstanding issues from a security audit of the code.
  • [30 Sep 2013] 1.0 Beta 1 Release is available for download. This release offers the first version with all of the functionality for a minimum viable product.

Many projects have "Frequently Asked Questions" documents or pages. However, the point of such a document is not the questions. The point of a document like this are the answers. The document contains the answers that people would otherwise find themselves giving over and over again. The idea is that rather than laboriously compose and post the same answers repeatedly, people can refer to this page with pre-prepared answers. Use this space to communicate your projects 'Frequent Answers.'

How can I participate in your project?

All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.

If I am not a programmer can I participate in your project?

Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.

Volunteers

The success of OWASP is due to a community of enthusiasts and contributors that work to make our projects great. This is also true for the success of your project. Be sure to give credit where credit is due, no matter how small! This should be a brief list of the most amazing people involved in your project. Be sure to provide a link to a complete list of all the amazing people in your project's community as well.

The OWASP Security Principles project is developed by a worldwide team of volunteers. A live update of project contributors is found here.

The first contributors to the project were:

  • Colin Watson who created the OWASP Cornucopia project that the template was derived from
  • Chuck Cooper who edited the template to convert it from a documentation project to a Code Project Template
  • YOUR NAME BELONGS HERE AND YOU SHOULD REMOVE THE PRIOR 3 NAMES

Project Process - following UIDM development process.

Pre-project activities, (UIDM stage 1) October – November 2014 •​Initial user engagement with digital forensics •​Confirm data protection procedures Outputs: Data protection policy, ethical submission document.

Work package one: Project set up and initial design (UIDM stage 1) December 2014 – February 2015 •​Establish website and blogging area •​Identify digital forensic evidence and security incident requirements •​Develop pedagogic and evaluation criteria •​Outline database and communication design •​Initial scenario and visitor centre Outputs: Workshop 1 event and report 'Ethics and IPR', project blog and community engagement and communication site, Introduction and dissemination of demonstration application.

Work Package two: Prototype development (UIDM stage 2) March 2015 – May 2015 •​Basic infrastructure implementation •​Implement reviewing and annotation to web application •​Develop induction and user training materials •​Contact and enrol collaborating institutions •​Enlist evaluation team and agree remit Outputs: Trial scenarios, prospective user support pack,

Work Package three: System prototyping and initial feedback, UIDM stages 2 /3, June 2015 – August 2015 •​Detailed Design and implementation of controls and assets for configurable scenarios. •​Evaluate basic infrastructure with respect to usability and learning •​Additional scenario types (digital forensic evidence extraction, live data acquisition, ) •​Students and staff users to test induction and usability Outputs: tutor support pack, Initial evaluation report, Workshop 2 event and report : Applications of Virtual Digital Evidence Forensic Scenarios

Work Package four Technical development (UIDM stage 3) September 2015 – November 2015 •​Incorporate feedback from users and external reviewers •​Development of richer scenarios with bots and pre-determined 'events'. •​Finalise user interface, control and reporting resources. •​Incorporate with forensics teaching Outputs: pedagogic evaluation report, Implementation technical report: Workshop 3 – Cyber Security Incident Workshop

Work Package five: Dissemination and Evaluation – UIDM stage 4, December 2015 - February 2016 •​Evaluation and feedback from 5 selected institutions •​Incorporation of feedback into project Outputs: Final project report, Open access to service for users and collaborators Student and tutor induction and usage packs Case study on embedding within digital forensic and cyber security teaching at partner institutions Workshop 4 event and report: 'student and tutor experiences' Continuing development and usage plan, technical and pedagogic collaboration packs Cumulative evaluation report with external evaluation feedback Dissemination conference papers

Localization

Are you fluent in another language? Can you help translate the text strings in the Code Project Template into that language?

Testing

Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.

Feedback

Please use the project mailing list for feedback about:

  • What do like?
  • What don't you like?
  • What features would you like to see prioritized on the roadmap?

This page is where you should indicate what is the minimum set of functionality that is required to make this a useful product that addresses your core security concern. Defining this information helps the project leader to think about what is the critical functionality that a user needs for this project to be useful, thereby helping determine what the priorities should be on the roadmap. And it also helps reviewers who are evaluating the project to determine if the functionality sufficiently provides the critical functionality to determine if the project should be promoted to the next project category.

The Code Project Template must specify the minimum set of tabs a project should have, provide some an example layout on each tab, provide instructional text on how a project leader should modify the tab, and give some example text that illustrates how to create an actual project.

It would also be ideal if the sample text was translated into different languages.

Project deliverables will include

Virtual World Design and Requirements Documentation Use Cases User guide Usability Documentation Test Plan

Unity Crime Scene Design templates Unity Security Incident Design templates Unity Digital Forensic Evidence Objects. Unity Security Incident Evidence Objects

Front End Web Application Source Code

Digital Evidence Forensic Images and Virtual machine templates Security Incident Virtual Machines