CISSP考试指南笔记:7.8 调查

When a potential computer crime takes place, it is critical that the investigation steps are carried out properly to ensure that the evidence will be admissible to the court if things go that far and that it can stand up under the cross-examination and scrutiny that will take place.

Computer Forensics and Proper Collection of Evidence


Forensics is a science and an art that requires specialized techniques for the recovery, authentication, and analysis of electronic data for the purposes of a digital criminal investigation.

At one time computer forensic results were differentiated from network and code analysis, but now this entire area is referred to as digital evidence.

The people conducting the forensic investigation must be properly skilled in this trade and know what to look for.

Digital evidence must be handled in a careful fashion so it can be used in different courts, no matter what jurisdiction is prosecuting a suspect. Within the United States, there is the Scientific Working Group on Digital Evidence (SWGDE), which aims to ensure consistency across the forensic community. The principles developed by the SWGDE for the standardized recovery of computer-based evidence are governed by the following attributes:

  • Consistency with all legal systems

  • Allowance for the use of a common language

  • Durability

  • Ability to cross international and state boundaries

  • Ability to instill confidence in the integrity of evidence

  • Applicability to all forensic evidence

  • Applicability at every level, including that of individual, agency, and country

The SWGDE principles are listed next:

  1. When dealing with digital evidence, all of the general forensic and procedural principles must be applied.

  2. Upon the seizing of digital evidence, actions taken should not change that evidence.

  3. When it is necessary for a person to access original digital evidence, that person should be trained for the purpose.

  4. All activity relating to the seizure, access, storage, or transfer of digital evidence must be fully documented, preserved, and available for review.

  5. An individual is responsible for all actions taken with respect to digital evidence while the digital evidence is in their possession.

  6. Any agency that is responsible for seizing, accessing, storing, or transferring digital evidence is responsible for compliance with these principles.

 

剩余内容请关注本人公众号debugeeker, 链接为CISSP考试指南笔记:7.8 调查

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值