Security Basics mailing list archives
RE: Computer Forensics
From: "Robinson, Sonja" <SRobinson () HIPUSA com>
Date: Tue, 30 Aug 2005 17:52:28 -0400
No, they are correct. Any forensics work, properly done, MUST hold up in ac ourt of law whether or not it actually would be presented in one. Assume all will go to court, ie. Suiing for wrongful termination, etc. Sonja L. Robinson, CISSP, CIFI, CISA, CISM Forensic Specialist, Digital Investigations HIP Information Security Group Tel: 212-806-4125 srobinson () hipusa com -----Original Message----- From: steve [mailto:securityfocus () delahunty com] Sent: Tuesday, June 01, 2004 9:13 AM To: security-basics () securityfocus com Subject: Computer Forensics I recently wrote the list inquiring about firms that folks would recommend for computer forensics, and thanks for the replies. I have the list of recommendations if anyone wants the company names. An interesting aspect of the responses was to define what is meant by Computer Forensics. I think it would be good to hear from the list as to what we believe makes up the commonly understood realm of Computer Forensics. Here is how I have seen Computer Forensics traditionally defined, into these areas: Electronic Discovery Forensic Analysis Expert Testimony Below is how the Information Systems Audit and Control Association (ISACA) www.isaca.org defines Computer Forensics. The only area where I would not totally agree with their definition is that the outcome of the work does not necessarily have to be for use in a court of law. 2.1 Computer Forensics 2.1.1 Computer forensics can be defined as the process of extracting information and data from computer storage media using the available technology and establishing its accuracy and reliability for the purpose of producing the same as evidence in a court of law. 2.1.2 The challenge to computer forensics is actually finding this data, collecting it, preserving it and presenting it in a manner acceptable in a court of law. 2.1.3 Computer forensics primarily involves exploration and application of scientifically proven methods to gather, process, interpret and utilise digital evidence to: a.. Provide a conclusive description of all cyberattack activities for the purpose of complete post-attack enterprise and critical infrastructure information restoration b.. Correlate, interpret and predict adversarial actions and their effect on planned operations c.. Make digital data suitable and persuasive for introduction into a criminal investigative process 2.1.4 Computer forensics is a science as well as an art for extracting and gathering data from a computer to determine how an abuse or intrusion has occurred, when it occurred and who was the intruder. Organisations that employ good security practices and maintain appropriate logs are able to achieve the objectives easily. However, with the right knowledge and tools, forensic evidence can be extracted even from burned, waterlogged or physically damaged computer systems. ------------------------------------------------------------------------ --- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------ ----
Current thread:
- RE: Computer Forensics Robinson, Sonja (Aug 30)