HMWRK FORENSICS PROCEDURES-WK 3

HMWRK FORENSICS PROCEDURES-WK 3 - Practical Application of...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Overview Definition of Computer Forensics Why We Need Computer Forensics T Identification Collection of Evidence Required Documentation Imaging Examination Report Preparation Returning of Evidence
Background image of page 2
Definition of Computer Forensics Computer forensics involves the:  Identification Collection Preservation Examination, and  Analysis of digital information Digital Information becomes Digital Evidence
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What is Digital Evidence? Digital evidence is any information of value that is either stored or transmitted in a binary form, including digital audio, image, and video.
Background image of page 4
Computer Forensic Examination The Computer forensic examination is: Locating digital evidence  Evidence can withstand close scrutiny or a  legal challenge. 
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Incorporate computer forensic services Cases are requiring computer forensics IT Auditors have: authority technical know how
Background image of page 6
Reasons for Computer Forensic Services Inappropriate Use of State Systems Determining a Security Breach Detection of Disloyal Employees Evidence for Disputed Dismissals Malicious File Identification Theft of Information Assets Forgeries of Documents
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Process (1) Identification (2) Collection of Evidence (3) Required Documentation (4) Imaging (5) Examination (6) Report Preparation (7) Returning of Evidence
Background image of page 8
Identification IT AUDITOR’S ROLE (Forensic Specialist) 1. Determine if reason for computer forensics is appropriate. 2.
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 48

HMWRK FORENSICS PROCEDURES-WK 3 - Practical Application of...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online