- Digital Forensics and Incident Response
- Gerard Johansen
- 244字
- 2021-07-02 18:49:45
The digital forensic process
Much like the incident response process, the digital forensic process defines the flow of digital evidence related to an incident from when it is first identified to when it is presented to either the senior leadership or to a trier of fact such as a civil or criminal court. There are a number of schemas that define this process and, for the most part they generally follow a similar path. In this case, we will be utilizing the Digital Forensics Research Workshop (DFRWS) Digital Investigate Framework. This framework contains six elements:
- Identification.
- Preservation.
- Collection.
- Examination.
- Analysis.
- Presentation.

From an incident response standpoint, will not normally seize network components or critical systems and take them offline unless there is a compelling reason to do so. This is one of the balancing acts in regards to digital forensics and incident response. A purely digital forensic approach will take all relevant evidence, secure it, and process it. This process can take months depending on the type of incident. This approach, while thorough and detailed, can leave an organization without critical components. The CSIRT may be able to tell the leadership after a month long analysis what chain of events lead to a breach, but that would do them no good if they have lost a month's of revenue. The examiners assigned to a CSIRT must be ready to balance out the need for thoroughness with the need to resume or continue normal operations.
- VMware View Security Essentials
- 潮流:UI設計必修課
- Spring技術內幕:深入解析Spring架構與設計
- Hands-On Enterprise Automation with Python.
- WebRTC技術詳解:從0到1構建多人視頻會議系統
- Learning OpenStack Networking(Neutron)(Second Edition)
- 區塊鏈技術進階與實戰(第2版)
- Spring Security Essentials
- 機器學習微積分一本通(Python版)
- Swift語言實戰晉級
- Arduino Wearable Projects
- 大數據時代的企業升級之道(全3冊)
- Practical Maya Programming with Python
- Selenium WebDriver Practical Guide
- IBM RUP參考與認證指南