- Digital Forensics and Incident Response
- Gerard Johansen
- 183字
- 2021-07-02 18:49:49
Preparation
The ability to acquire network-based evidence is largely dependent on the preparations that are undertaken by an organization prior to an incident. Without some critical components of a proper infrastructure security program, key pieces of evidence will not be available for incident responders in a timely manner. The result is that evidence may be lost as the CSIRT members hunt down critical pieces of information. In terms of preparation, organizations can aid the CSIRT by having proper network documentation, up-to-date configurations of network devices, and a central log management solution in place.
Aside from the technical preparation for network evidence collection, CSIRT personnel need to be aware of any legal or regulatory issues in regards to collecting network evidence. CSIRT personnel need to be aware that capturing network traffic can be considered an invasion of privacy absent any other policy. Therefore, the legal representative of the CSIRT should ensure that all employees of the organization understand that their use of the information system can be monitored. This should be expressly stated in policies prior to any evidence collection that may take place.
- Mastering OpenLayers 3
- Rust編程從入門到實(shí)戰(zhàn)
- Redis Essentials
- Spring Boot企業(yè)級項(xiàng)目開發(fā)實(shí)戰(zhàn)
- Nginx實(shí)戰(zhàn):基于Lua語言的配置、開發(fā)與架構(gòu)詳解
- Python數(shù)據(jù)結(jié)構(gòu)與算法(視頻教學(xué)版)
- Elasticsearch Essentials
- Learning D
- Android 游戲開發(fā)大全(第二版)
- Web前端開發(fā)技術(shù)實(shí)踐指導(dǎo)教程
- Mastering Machine Learning with scikit-learn
- Implementing Splunk(Second Edition)
- Spring MVC Cookbook
- Opa Application Development
- Learning SaltStack(Second Edition)