- Digital Forensics and Incident Response
- Gerard Johansen
- 244字
- 2021-07-02 18:49:45
The digital forensic process
Much like the incident response process, the digital forensic process defines the flow of digital evidence related to an incident from when it is first identified to when it is presented to either the senior leadership or to a trier of fact such as a civil or criminal court. There are a number of schemas that define this process and, for the most part they generally follow a similar path. In this case, we will be utilizing the Digital Forensics Research Workshop (DFRWS) Digital Investigate Framework. This framework contains six elements:
- Identification.
- Preservation.
- Collection.
- Examination.
- Analysis.
- Presentation.

From an incident response standpoint, will not normally seize network components or critical systems and take them offline unless there is a compelling reason to do so. This is one of the balancing acts in regards to digital forensics and incident response. A purely digital forensic approach will take all relevant evidence, secure it, and process it. This process can take months depending on the type of incident. This approach, while thorough and detailed, can leave an organization without critical components. The CSIRT may be able to tell the leadership after a month long analysis what chain of events lead to a breach, but that would do them no good if they have lost a month's of revenue. The examiners assigned to a CSIRT must be ready to balance out the need for thoroughness with the need to resume or continue normal operations.
- Java語言程序設計
- Java程序設計與開發
- Apache Oozie Essentials
- Redis Applied Design Patterns
- 跟小海龜學Python
- Java:High-Performance Apps with Java 9
- Raspberry Pi Home Automation with Arduino(Second Edition)
- 從零開始學Linux編程
- 速學Python:程序設計從入門到進階
- CRYENGINE Game Development Blueprints
- Oracle Data Guard 11gR2 Administration Beginner's Guide
- Python程序設計教程
- 安卓工程師教你玩轉Android
- ArcPy and ArcGIS(Second Edition)
- Java編程指南:語法基礎、面向對象、函數式編程與項目實戰