- Digital Forensics and Incident Response
- Gerard Johansen
- 244字
- 2021-07-02 18:49:45
The digital forensic process
Much like the incident response process, the digital forensic process defines the flow of digital evidence related to an incident from when it is first identified to when it is presented to either the senior leadership or to a trier of fact such as a civil or criminal court. There are a number of schemas that define this process and, for the most part they generally follow a similar path. In this case, we will be utilizing the Digital Forensics Research Workshop (DFRWS) Digital Investigate Framework. This framework contains six elements:
- Identification.
- Preservation.
- Collection.
- Examination.
- Analysis.
- Presentation.

From an incident response standpoint, will not normally seize network components or critical systems and take them offline unless there is a compelling reason to do so. This is one of the balancing acts in regards to digital forensics and incident response. A purely digital forensic approach will take all relevant evidence, secure it, and process it. This process can take months depending on the type of incident. This approach, while thorough and detailed, can leave an organization without critical components. The CSIRT may be able to tell the leadership after a month long analysis what chain of events lead to a breach, but that would do them no good if they have lost a month's of revenue. The examiners assigned to a CSIRT must be ready to balance out the need for thoroughness with the need to resume or continue normal operations.
- Vue.js設計與實現
- 零起步玩轉掌控板與Mind+
- Hands-On C++ Game Animation Programming
- WordPress Plugin Development Cookbook(Second Edition)
- Learning Python Design Patterns
- Mastering ArcGIS Enterprise Administration
- Nagios Core Administration Cookbook(Second Edition)
- TypeScript圖形渲染實戰:2D架構設計與實現
- Yii2 By Example
- Building Microservices with Go
- Visual FoxPro數據庫程序設計
- TensorFlow.NET實戰
- Instant JRebel
- Java入門經典
- Python機器學習技術:模型關系管理