- Digital Forensics and Incident Response
- Gerard Johansen
- 183字
- 2021-07-02 18:49:49
Preparation
The ability to acquire network-based evidence is largely dependent on the preparations that are undertaken by an organization prior to an incident. Without some critical components of a proper infrastructure security program, key pieces of evidence will not be available for incident responders in a timely manner. The result is that evidence may be lost as the CSIRT members hunt down critical pieces of information. In terms of preparation, organizations can aid the CSIRT by having proper network documentation, up-to-date configurations of network devices, and a central log management solution in place.
Aside from the technical preparation for network evidence collection, CSIRT personnel need to be aware of any legal or regulatory issues in regards to collecting network evidence. CSIRT personnel need to be aware that capturing network traffic can be considered an invasion of privacy absent any other policy. Therefore, the legal representative of the CSIRT should ensure that all employees of the organization understand that their use of the information system can be monitored. This should be expressly stated in policies prior to any evidence collection that may take place.
- Visual C++程序設計教程
- Raspberry Pi Networking Cookbook(Second Edition)
- AngularJS Web Application Development Blueprints
- Java從入門到精通(第5版)
- Python Deep Learning
- C語言程序設計
- Mastering LibGDX Game Development
- PhpStorm Cookbook
- Getting Started with Python Data Analysis
- 飛槳PaddlePaddle深度學習實戰(zhàn)
- Oracle 18c 必須掌握的新特性:管理與實戰(zhàn)
- Kivy Cookbook
- Python入門很輕松(微課超值版)
- Solutions Architect's Handbook
- PhoneGap 4 Mobile Application Development Cookbook