Data forensics

    Date13 Nov 2003
    4321
    Posted ByAnthony Pell
    Part of your security package should include forensic testing, and the process is as important as the tools you use. Jon Tullett identifies the right approach. With incident response closely tied to business continuity and the bottom line, computer forensics has . . . Part of your security package should include forensic testing, and the process is as important as the tools you use. Jon Tullett identifies the right approach. With incident response closely tied to business continuity and the bottom line, computer forensics has become a core component of corporate security, and a daily weapon in the arsenal of law enforcement agencies.

    Firstly, forensics is not about the tools, but about the process. All forensic investigations follow a series of steps to move from the stage of identifying what is to be examined to the point of presenting evidence. This may be for use in court, for internal disciplinary procedures or simply to monitor an incident. Failing to follow accepted forensic guidelines will cause evidence to be questioned and the collapse of what could be a bulletproof case.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"8","type":"x","order":"1","pct":88.89,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.