官术网_书友最值得收藏!

Network Evidence Collection

The traditional focus of digital forensics has been to locate evidence on the host hard drive. Law enforcement officers interested in criminal activity such as fraud or child exploitation can find the vast majority of evidence required for prosecution on a single hard drive. In the realm of incident response though, it is critical that the focus goes far beyond a suspected compromised system. For example, there is a wealth of information to be obtained within the points along the flow of traffic from a compromised host to an external C2 server.

This chapter focuses on the preparation, identification, and collection of evidence that is commonly found among network devices and along the traffic routes within an internal network. This collection is critical during an incident where an external threat source is in the process of commanding internal systems or is in the process of pilfering data out of the network. Network-based evidence is also useful when examining host evidence as it provides a second source of event corroboration, which is extremely useful in determining the root cause of an incident.

主站蜘蛛池模板: 吉隆县| 寻甸| 新平| 乌兰浩特市| 尖扎县| 太白县| 漾濞| 丰顺县| 积石山| 尉氏县| 达日县| 大渡口区| 德兴市| 调兵山市| 乐陵市| 临清市| 抚宁县| 汪清县| 贵定县| 扬州市| 澄城县| 余江县| 正宁县| 邵阳市| 临清市| 鹰潭市| 定日县| 于都县| 临漳县| 綦江县| 榆中县| 鄯善县| 蓝田县| 博湖县| 香河县| 阜南县| 林周县| 龙岩市| 西青区| 海晏县| 黔东|