![Implementing Digital Forensic Readiness](https://img.perlego.com/book-covers/1809331/9780128045015_300_450.webp)
Implementing Digital Forensic Readiness
From Reactive to Proactive Process
Jason Sachowski
- 374 páginas
- English
- ePUB (apto para móviles)
- Disponible en iOS y Android
Implementing Digital Forensic Readiness
From Reactive to Proactive Process
Jason Sachowski
Información del libro
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization's business operations and information security's program. This book illustrates how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents. It also explains how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the administrative, technical, and physical elements included throughout this book will enhance the relevance and credibility of digital evidence. Learn how to document the available systems and logs as potential digital evidence sources, how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner. This book offers standard operating procedures to document how an evidence-based presentation should be made, featuring legal resources for reviewing digital evidence.
- Explores the training needed to ensure competent performance of the handling, collecting, and preservation of digital evidence
- Discusses the importance of how long term data storage must take into consideration confidentiality, integrity, and availability of digital evidence
- Emphasizes how incidents identified through proactive monitoring can be reviewed in terms of business risk
- Includes learning aids such as chapter introductions, objectives, summaries, and definitions
Preguntas frecuentes
Información
Introduction
Introduction
Appendix A: Investigative Process Models
Introduction
Process Models
[M01] Computer Forensic Investigative Process (1995)
ID | Name | Author(s) | Year | Phases |
M01 | Computer Forensic Investigative Process | M. Pollitt | 1995 | 4 |
M02 | Computer Forensic Process Model | US Department of Justice | 2001 | 4 |
M03 | Digital Forensic Research Workshop Investigative Model (Generic Investigation Process) | Palmer | 200... |
Índice
- Cover image
- Title page
- Table of Contents
- Copyright
- Preface
- Introduction
- About the Author
- Acknowledgments
- Section A. Digital Forensics
- Section B. Digital Forensic Readiness
- Section C. Appendices
- Section D. Templates
- Bibliography
- Index