前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >CISSP考试指南笔记:7.8 调查

CISSP考试指南笔记:7.8 调查

作者头像
血狼debugeeker
发布2021-03-23 11:11:40
3130
发布2021-03-23 11:11:40
举报
文章被收录于专栏:debugeeker的专栏

When a potential computer crime takes place, it is critical that the investigation steps are carried out properly to ensure that the evidence will be admissible to the court if things go that far and that it can stand up under the cross-examination and scrutiny that will take place.

Computer Forensics and Proper Collection of Evidence


Forensics is a science and an art that requires specialized techniques for the recovery, authentication, and analysis of electronic data for the purposes of a digital criminal investigation.

At one time computer forensic results were differentiated from network and code analysis, but now this entire area is referred to as digital evidence.

The people conducting the forensic investigation must be properly skilled in this trade and know what to look for.

Digital evidence must be handled in a careful fashion so it can be used in different courts, no matter what jurisdiction is prosecuting a suspect. Within the United States, there is the Scientific Working Group on Digital Evidence (SWGDE), which aims to ensure consistency across the forensic community. The principles developed by the SWGDE for the standardized recovery of computer-based evidence are governed by the following attributes:

  • Consistency with all legal systems
  • Allowance for the use of a common language
  • Durability
  • Ability to cross international and state boundaries
  • Ability to instill confidence in the integrity of evidence
  • Applicability to all forensic evidence
  • Applicability at every level, including that of individual, agency, and country

The SWGDE principles are listed next:

  1. When dealing with digital evidence, all of the general forensic and procedural principles must be applied.
  2. Upon the seizing of digital evidence, actions taken should not change that evidence.
  3. When it is necessary for a person to access original digital evidence, that person should be trained for the purpose.
  4. All activity relating to the seizure, access, storage, or transfer of digital evidence must be fully documented, preserved, and available for review.
  5. An individual is responsible for all actions taken with respect to digital evidence while the digital evidence is in their possession.
  6. Any agency that is responsible for seizing, accessing, storing, or transferring digital evidence is responsible for compliance with these principles.
本文参与 腾讯云自媒体同步曝光计划,分享自作者个人站点/博客。
原始发表:2021/03/12 ,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 作者个人站点/博客 前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体同步曝光计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
目录
  • Computer Forensics and Proper Collection of Evidence
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档