Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)

 < Day Day Up > 


Don’t react, respond! Cyber crime is rapidly increasing and is striking at the heart of many organizations. By ensuring measures such as effective policies and rapid response capabilities, excellent information technology security positioning and forensic support can exist. Businesses can respond quickly, minimizing the risks of lost data, financial loss, network damage, and loss of reputation.

Organizations wanting to counter cyber crime need to apply risk management techniques that allow a speedy response and minimize harm. Although organizations cannot prevent a cyberattack, they can have a planned response and even turn e-crime preparedness, or effective security, into a new competitive advantage.

Conclusions Drawn from Types of Vendor and Computer Forensics Services

An Agenda for Action in Types of Vendor and Computer Forensics Services

The following is a provisional list of actions for some of the principle types of vendor and computer forensic services. The order is not significant; however, these are the activities for which the research would want to provide a detailed description of procedures, review, and assessment for ease of use and admissibility. A number of these services have been mentioned in passing already:

  1. Computer Forensics services should provide: Analysis of computers and data in criminal investigations; on-site seizure of computer data in criminal investigations; analysis of computers and data in civil litigation; on-site seizure of computer data in civil litigation; analysis of company computers to determine employee activity; assistance in preparing electronic discovery requests; reporting in a comprehensive and readily understandable manner; court-recognized computer expert witness testimony; computer forensics on both PC and MAC platforms; and fast turnaround time.

  2. Computers systems may crash. Files may be accidentally deleted. Disks may accidentally be reformatted. Computer viruses may corrupt files. Files may be accidentally overwritten. Disgruntled employees may try to destroy your files. All of these can lead to the loss of your critical data. You may think it’s lost forever, but you should employ the latest tools and techniques to recover your data.

  3. In many instances, the data cannot be found using the limited software tools available to most users. The advanced tools that you utilize should allow you to find your files and restore them for your use. In those instances where the files have been irreparably damaged, your computer forensics expertise should allow you to recover even the smallest remaining fragments.

  4. Business today relies on computers. Your sensitive client records or trade secrets are vulnerable to such intentional attacks as computer hackers, disgruntled employees, viruses, and corporate espionage. Equally threatening, but far less considered, are unintentional data losses caused by accidental deletion, computer hardware and software crashes, and accidental modification. You should safeguard your data by such methods as encryption and back-up. You should also thoroughly “clean” sensitive data from any computer system you plan on disposing of.

  5. Your files, records, and conversations are just as vital to protect as your data. You should survey your business and provide guidance for improving the security of your information. This includes such possible information leaks as cordless telephones, cellular telephones, trash, employees, and answering machines.

  6. Always keep in mind that the IP you are investigating is only the apparent source of the activity you see on your logs. As mentioned earlier, this does not mean that you should ignore the IP address, only be cognizant of its limitations for determining the possible attribution of the event you are investigating. Although this process will educate the administrator on how to characterize the threat to his or her company from analyzing IP addresses that appear in the logs, a complete determination of the threat your organization faces is a more involved process.

  7. What you can be sure of is that many threat entities will probe and attempt to intrude on your systems over time. These may range from Class I (privacy), II (industrial espionage), or Class III (terrorism) attacks. Attackers may range from the script kiddy aimlessly probing the networks, to a dedicated industrial espionage hacker looking for your company’s secrets. Depending on your company’s resources and the value of those resources, you should also investigate the possibility of staffing a professional competitive intelligence cell in your company or in sponsoring an assessment of the threat to your company’s systems from a group of intelligence and information security specialists.

  8. The serious threat to your IT infrastructure is not a teenage hacker defacing your Web site. The true dangers are information and monetary theft, business disruption, and critical infrastructure failure. Perpetrators are likely to be professional criminals, hacktivists, competitors, or even foreign intelligence agencies. The most costly intrusions are likely to be those that you fail to detect. The bottom line, you need to know the threat against your systems as well as its vulnerabilities.


 < Day Day Up > 

Категории