官术网_书友最值得收藏!

The digital forensic process

Much like the incident response process, the digital forensic process defines the flow of digital evidence related to an incident from when it is first identified to when it is presented to either the senior leadership or to a trier of fact such as a civil or criminal court. There are a number of schemas that define this process and, for the most part they generally follow a similar path. In this case, we will be utilizing the Digital Forensics Research Workshop (DFRWS) Digital Investigate Framework. This framework contains six elements:

  1. Identification.
  2. Preservation.
  3. Collection.
  4. Examination.
  5. Analysis.
  6. Presentation.

From an incident response standpoint, will not normally seize network components or critical systems and take them offline unless there is a compelling reason to do so. This is one of the balancing acts in regards to digital forensics and incident response. A purely digital forensic approach will take all relevant evidence, secure it, and process it. This process can take months depending on the type of incident. This approach, while thorough and detailed, can leave an organization without critical components. The CSIRT may be able to tell the leadership after a month long analysis what chain of events lead to a breach, but that would do them no good if they have lost a month's of revenue. The examiners assigned to a CSIRT must be ready to balance out the need for thoroughness with the need to resume or continue normal operations.

主站蜘蛛池模板: 万全县| 九江县| 酉阳| 光泽县| 易门县| 定西市| 鄂伦春自治旗| 金堂县| 蓬溪县| 海口市| 卢氏县| 巴楚县| 贞丰县| 封丘县| 抚远县| 盐池县| 平度市| 轮台县| 闽清县| 金沙县| 普陀区| 大邑县| 玉屏| 鸡西市| 大渡口区| 繁峙县| 甘谷县| 黄冈市| 且末县| 武安市| 陆丰市| 城固县| 桓仁| 邮箱| 侯马市| 丰原市| 开化县| 龙泉市| 徐水县| 江都市| 调兵山市|