官术网_书友最值得收藏!

Network Evidence Collection

The traditional focus of digital forensics has been to locate evidence on the host hard drive. Law enforcement officers interested in criminal activity such as fraud or child exploitation can find the vast majority of evidence required for prosecution on a single hard drive. In the realm of incident response though, it is critical that the focus goes far beyond a suspected compromised system. For example, there is a wealth of information to be obtained within the points along the flow of traffic from a compromised host to an external C2 server.

This chapter focuses on the preparation, identification, and collection of evidence that is commonly found among network devices and along the traffic routes within an internal network. This collection is critical during an incident where an external threat source is in the process of commanding internal systems or is in the process of pilfering data out of the network. Network-based evidence is also useful when examining host evidence as it provides a second source of event corroboration, which is extremely useful in determining the root cause of an incident.

主站蜘蛛池模板: 桦甸市| 新泰市| 庄浪县| 绥阳县| 睢宁县| 瑞丽市| 曲阳县| 集贤县| 昂仁县| 陈巴尔虎旗| 拉萨市| 石渠县| 庆阳市| 汽车| 苏尼特右旗| 什邡市| 定襄县| 万载县| 鲁山县| 柳河县| 聂拉木县| 丰县| 平陆县| 托克逊县| 巴林右旗| 秦皇岛市| 洪泽县| 方城县| 竹山县| 鸡泽县| 博乐市| 竹溪县| 扶风县| 临汾市| 肥乡县| 乌审旗| 大安市| 法库县| 福贡县| 错那县| 柳州市|