<div>Great proposal, makes this educational experience available to regional areas. </div><div><br></div><div><br><div class="gmail_quote"><div>On Wed., 7 Jun. 2017 at 10:20, Paul Watters via linux-aus <<a href="mailto:linux-aus@lists.linux.org.au">linux-aus@lists.linux.org.au</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div style="word-wrap:break-word"><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">1. Project name</span><span style="color:rgb(38,38,38);font-family:Verdana"> </span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Building the Open Source Talent Pipeline in Australia: A Cyber Forensics Student Extension Program<u></u><u></u></span></p><p class="MsoNormal"><br></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">2. Aim of the project, including any key stages or milestones of the project<u></u><u></u></span></p><p class="MsoNormal"><span style="color:rgb(38,38,38);font-family:Verdana">Research indicates that young people are genuinely interested in technology at an early age, but that negative experiences within a highly constrained curriculum, coupled with being taught (in many cases) by unqualified teachers, can led to disengagement. This is coupled with negative stereotypes portrayed in the media and popular culture around “nerds” and “geeks”; peer pressure to conform to social expectations and constructs discourages young people from technology careers, despite industry-identified “skills gaps” and high salaries. Finally, accessing technologies can be very expensive, and groups that face barriers to access (such as young people with a disability, or homeless students). Students may not be aware that there are alternatives to commercial, closed source technologies that are easily accessible, and which provide the freedom to create and contribute.</span><span style="color:rgb(38,38,38);font-family:Verdana"> </span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">The aim of this project is to create an open source forensics educational engagement programme in Victoria, that is aligned with the digital literacy VCE syllabus. The project seeks to re-engage students in senior years using the “CSI Effect”; particularly with the publicity given to cyber attacks linked to closed source / proprietary technologies, this is an excellent opportunity to embed open source values early in learning. Especially in the security field, rigorous peer review and critique leads to the best solutions, rather than relying on secrecy and obscurity. </span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">The engagement programme will not seek to replace anything taught on the curriculum, but instead focus on fun, topical and engaging experiences, that may stimulate and motivate students to consider cyber security as a career. The programme will only use open source forensics tools, but will reveal how closed source technologies can be subjected to physical examination.</span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">While the project team will contribute their time as an in-kind contribution to the project, funding is sought to purchase a range of typical hardware devices to physically examine, and create forensic use cases for. This will give students who take the programme some hands-on experience with real-world technologies, using open source tools. Students will also be shown how an open source forensics toolkit can be extended as needed.</span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">The programme will comprise a set of four learning activities, designed to be undertaken over 4 x 1 hour sessions, ideally suited to an “incursion” or workshop run at a school. The hardware devices will be made available free of charge to all schools in Victoria: schools will only be asked to pay for shipping costs to borrow the equipment. All educational materials developed through the programme will be released under a Creative Commons license. The project team hopes that this will encourage law enforcement and private sector security teams to contribute further use cases and data to improve the programme.</span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">To develop the programme, a four-stage project plan is envisaged:<u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Stage 1: Learning activity design (100 Hours)</span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">In this stage, the four learning activities will be designed to match typical cyber forensic tasks, including evidence acquisition, timeline analysis, media analysis, and data recovery. Students will also be encouraged to compile a report based on their results.<u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Stage 2: Forensic use case identification (50 Hours)</span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">In this stage, the four learning activities will be mapped to typical use cases, including fraud, scams, malware infection and counter terrorism investigations. The project team shall liaise with law enforcement, as appropriate, to create these use cases, and make them as interesting and realistic as possible.<u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Stage 3: Software selection (50 Hours)</span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">In this stage, a range of open source forensic toolkits will be obtained and tested to see whether they can meet the requirements of the use cases. Well-known packages, including Autopsy and the Sleuth Kit, will be obtained, as well as specialized packages for iOS forensics, including Logical iOS Forensic Examiner (LIFE).<u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Stage 4: Hardware purchase and use cases realized (100 Hours)</span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">The equipment requested in this application will be purchased, and data relating to the use cases will be created and imaged. These images will be uploaded to the hardware devices.<u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Assuming a starting date of 1<sup>st</sup> July 2017, and spending 10 hours per week, the project should be developed by September 9<sup>th</sup> 2017. We will then communicate the availability of the programme through appropriate channels, such as the La Trobe University career advisor mailing list, and Quantum Victoria. <u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">3. How the success of the project will be measured</span><span style="color:rgb(38,38,38);font-family:Verdana"> </span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">We will create a self-report survey for students to take before and after the activity, and measure whether their awareness of open source has increased, and whether or not they would consider cyber security as a career choice. We will seek ethics approval before administering any questionnaires to students.<u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">4. Estimated cost breakdown of the project, including any materials, projects or online services that are required to deliver the project. The cost breakdown should include estimates of labour costs and/or professional services</span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">The hardware devices requested represent a range of typical forensic use cases, including Android phones and Linux servers (RedHat and Debian), as well as Raspberry pi kits for network forensics. Some basic forensic kits, required for data capture and transfer, will also be requested. Two sets of equipment are requested, so that the teacher can use one for demonstration, and one is available for students to use at the same time. <u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">In-kind contribution (200 Hours x $118ph = $23,755 + GST = $26,130)<u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Equipment requested:</span></p><p class="m_-7372572425284678244MsoListParagraphCxSpFirst"><span lang="EN-US" style="font-family:Symbol;color:rgb(38,38,38)">·<span style="font-size:7pt;line-height:normal;font-family:'Times New Roman'"> </span></span><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"><a href="http://forensicstore.com" target="_blank">Forensicstore.com</a> – Cellphone companion kit, including faraday pouch, cables, media etc x 2= $612<u></u><u></u></span></p><p class="m_-7372572425284678244MsoListParagraphCxSpMiddle"><span lang="EN-US" style="font-family:Symbol;color:rgb(38,38,38)">·<span style="font-size:7pt;line-height:normal;font-family:'Times New Roman'"> </span></span><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Dell PowerEdge T130 with Linux x 2 = $3,092<u></u><u></u></span></p><p class="m_-7372572425284678244MsoListParagraphCxSpMiddle"><span lang="EN-US" style="font-family:Symbol;color:rgb(38,38,38)">·<span style="font-size:7pt;line-height:normal;font-family:'Times New Roman'"> </span></span><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Samsung Galaxy J7 Prime x 2 = $798<u></u><u></u></span></p><p class="m_-7372572425284678244MsoListParagraphCxSpMiddle"><span lang="EN-US" style="font-family:Symbol;color:rgb(38,38,38)">·<span style="font-size:7pt;line-height:normal;font-family:'Times New Roman'"> </span></span><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Ultimate Raspberry Pi Kit x 2 = $478<u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Total Requested: $4,980<u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Linux Australia contribution to total project cost: 19.05%<u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">5. The project team, their credentials and professional capabilities, especially their history of open source, open data, open hardware or open culture contributions</span><span style="color:rgb(38,38,38);font-family:Verdana"> </span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Dr Paul A. Watters is Associate Professor in Cyber Security at La Trobe University. Dr Watters has been using Linux for 24 years, having first installed in on 360K floppies on an XT. Dr Watters has written several books on Linux and open source topics, as well as releasing open source packages for neural network modeling and fractal analysis. He has published numerous papers on cyber forensics, and is working with Quantum Victoria to deliver Australia’s first “cyber games”, targeting high school students who may be interested in pursuing cyber security as a career.<u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Maya F. Watters is a Leading Teacher at Bacchus Marsh College. Ms Watters studied education at the University of Melbourne, and forensics at the University of Auckland. She has worked on a number of forensic projects for Cyber Inc, a not-for-profit incorporated association in Victoria. <u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">6. Person responsible for project</span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">Dr. Watters will be the project manager and will have overall responsibility. <u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)"> </span><br class="m_-7372572425284678244webkit-block-placeholder"></div><p class="MsoNormal"><span lang="EN-US" style="font-family:Verdana;color:rgb(38,38,38)">7. A statement including a willingness to provide regular project updates on the project</span></p><p class="MsoNormal"><span lang="EN-US" style="font-family:Arial;color:rgb(38,38,38)">The project team shall provide updates to Linux Australia at each phase of the project.<u></u><u></u></span></p><div><span lang="EN-US" style="font-family:Arial;color:rgb(38,38,38)"><br></span></div><div>
<div style="color:rgb(0,0,0);letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;word-wrap:break-word"><div style="margin:0px;font-size:11px;line-height:normal;font-family:Menlo"><span style="font-variant-ligatures:no-common-ligatures">—</span></div><div style="margin:0px;font-size:11px;line-height:normal;font-family:Menlo"><span style="font-variant-ligatures:no-common-ligatures">Dr Paul A. Watters FBCS SMIEEE CITP</span></div><div style="margin:0px;font-size:11px;line-height:normal;font-family:Menlo"><span style="font-variant-ligatures:no-common-ligatures">Associate Professor in Cybersecurity | Adjunct Professor in Computing</span></div><div style="margin:0px;font-size:11px;line-height:normal;font-family:Menlo"><span style="font-variant-ligatures:no-common-ligatures">La Trobe University | Unitec Institute of Technology</span></div><div style="margin:0px;font-size:11px;line-height:normal;font-family:Menlo"><span style="font-variant-ligatures:no-common-ligatures">CRICOS Provider Code 00115M</span></div><div style="margin:0px;font-size:11px;line-height:normal;font-family:Menlo"><span style="font-variant-ligatures:no-common-ligatures">E: <<a href="mailto:P.Watters@latrobe.edu.au" target="_blank">P.Watters@latrobe.edu.au</a>> P: +61-3-9479-3415</span></div><br><br></div>
</div>
<br></div>_______________________________________________<br>
linux-aus mailing list<br>
<a href="mailto:linux-aus@lists.linux.org.au" target="_blank">linux-aus@lists.linux.org.au</a><br>
<a href="http://lists.linux.org.au/mailman/listinfo/linux-aus" rel="noreferrer" target="_blank">http://lists.linux.org.au/mailman/listinfo/linux-aus</a><br>
</blockquote></div></div><div dir="ltr">-- <br></div><div data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div><br>Troy Lea<br></div>IT Consultant and Nagios Developer<br></div><div><a href="mailto:troy@box293.com" target="_blank">troy@box293.com</a></div><div><a href="http://sites.box293.com/nagios" target="_blank">sites.box293.com/nagios</a><br><br><img src="https://sites.google.com/a/box293.com/share/images/Wax-Seal-Logo-200x132.png"> <img src="https://sites.google.com/a/box293.com/share/images/NCP-132x132.png"> <img src="https://sites.google.com/a/box293.com/share/images/NCA-132x132.png"> <img src="https://sites.google.com/a/box293.com/share/images/K_VMW_09Q3_LGO_PARTNER_TECH_ALLI-168x132.png"> <br></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>