Security Basics mailing list archives

RE: Computer Forensics


From: "Robinson, Sonja" <SRobinson () HIPUSA com>
Date: Tue, 30 Aug 2005 17:52:28 -0400

No, they are correct.  Any forensics work, properly done, MUST hold up
in ac ourt of law whether or not it actually would be presented in one.
Assume all will go to court, ie. Suiing for wrongful termination, etc. 


Sonja L. Robinson, CISSP, CIFI, CISA, CISM
Forensic Specialist, Digital Investigations
HIP Information Security Group
Tel: 212-806-4125
srobinson () hipusa com
 

-----Original Message-----
From: steve [mailto:securityfocus () delahunty com] 
Sent: Tuesday, June 01, 2004 9:13 AM
To: security-basics () securityfocus com
Subject: Computer Forensics

I recently wrote the list inquiring about firms that folks would
recommend for computer forensics, and thanks for the replies.  I have
the list of recommendations if anyone wants the company names.  An
interesting aspect of the responses was to define what is meant by
Computer Forensics.  I think it would be good to hear from the list as
to what we believe makes up the commonly understood realm of Computer
Forensics.  Here is how I have seen Computer Forensics traditionally
defined, into these areas:

    Electronic Discovery
    Forensic Analysis
    Expert Testimony

Below is how the Information Systems Audit and Control Association
(ISACA) www.isaca.org defines Computer Forensics.  The only area where I
would not totally agree with their definition is that the outcome of the
work does not necessarily have to be for use in a court of law.
2.1 Computer Forensics
2.1.1 Computer forensics can be defined as the process of extracting
information and data from computer storage media using the available
technology and establishing its accuracy and reliability for the purpose
of producing the same as evidence in a court of law.

2.1.2 The challenge to computer forensics is actually finding this data,
collecting it, preserving it and presenting it in a manner acceptable in
a court of law.

2.1.3 Computer forensics primarily involves exploration and application
of scientifically proven methods to gather, process, interpret and
utilise digital evidence to:

  a.. Provide a conclusive description of all cyberattack activities for
the purpose of complete post-attack enterprise and critical
infrastructure information restoration
  b.. Correlate, interpret and predict adversarial actions and their
effect on planned operations
  c.. Make digital data suitable and persuasive for introduction into a
criminal investigative process
2.1.4 Computer forensics is a science as well as an art for extracting
and gathering data from a computer to determine how an abuse or
intrusion has occurred, when it occurred and who was the intruder.
Organisations that employ good security practices and maintain
appropriate logs are able to achieve the objectives easily. However,
with the right knowledge and tools, forensic evidence can be extracted
even from burned, waterlogged or physically damaged computer systems.





------------------------------------------------------------------------
---
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545
off any course! All of our class sizes are guaranteed to be 10 students
or less to facilitate one-on-one interaction with one of our expert
instructors. 
Attend a course taught by an expert instructor with years of
in-the-field pen testing experience in our state of the art hacking lab.
Master the skills of an Ethical Hacker to better assess the security of
your organization. 
Visit us at: 
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
------------------------------------------------------------------------
----


Current thread: