product description page
Implementing Digital Forensics Readiness : From Reactive to Proactive Process (Paperback) (Jason
about this item
Implementing Digital Forensics Readiness: From Reactive to Proactive Process shows information security professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics in their organization. The bookbegins by showing how digital forensics aligns strategically within an information security’s overall program. It shows how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents, also explaining how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the book consists of administrative, technical, and physical actions to enhance the use digital evidence.
Implementing Digital Forensics Readiness: From Reactive to Proactive Process shows how to document the available systems and logs as potential digital evidence sources. The book shows how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner so that digital evidence can identify and detect incidents and events as they occur.Implementing Digital Forensics Readiness: From Reactive to Proactive Process offers a set of standard operating procedures to document how an evidence-based presentation of digital evidence should be made, and concludes with how to consult legal resources for reviewing digital evidence.
- Explores the training needed to ensure competent performance of the handling, collecting, and preservation of digital evidence
- Discusses the importance of how long term data storage must take into consideration confidentiality, integrity, and availability of digital evidence
- Emphasizes how incidents identified through proactive monitoring can be reviewed in terms of business risk
- Includes learning aids such as chapter introductions, objectives, summaries, and definitions