100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
IT forensics samenvatting $3.25   Add to cart

Summary

IT forensics samenvatting

1 review
 382 views  8 purchases
  • Course
  • Institution
  • Book

samenvatting IT forensics

Preview 2 out of 32  pages

  • Yes
  • January 22, 2016
  • 32
  • 2015/2016
  • Summary

1  review

review-writer-avatar

By: vincentvandijk • 6 year ago

avatar-seller
Samenvatting: Forensics Jumpstart
Inhoud
Hoofdstuk 1: The Need for Computer Forensics ..................................................................................... 2
Hoofdstuk 2: prepation What to do before you start? ........................................................................... 4
Hoofdstuk 3: computer evidence ............................................................................................................ 6
Hoofdstuk 4: Common tasks ................................................................................................................... 9
Hoofdstuk 5: Capturing the Data image ................................................................................................ 11
Hoofdstuk 6: Extracting information from data .................................................................................... 15
Hoofdstuk 7: Passwords and encryption ............................................................................................... 18
Hoofdstuk 8: Common Forensic Tools .................................................................................................. 22
Hoofdstuk 9: putting it all together ....................................................................................................... 27
Hoofdstuk 10: How to testify in Court .................................................................................................. 31

, Hoofdstuk 1: The Need for Computer Forensics
The New Shorter Oxford English Dictionary defines computer forensics as “the application of forensic
science techniques to computer‐based material.” In other words, forensic computing is the process
of identifying, preserving, analyzing, and presenting digital evidence in a manner that is acceptable in
a legal proceeding.

Computer forensics can also be described as the critical analysis of a computer hard disk drive after
an intrusion or crime.

In looking at the major concepts behind computer forensics, the main emphasis is on data recovery.
To do that you must:
 Identify meaningful evidence
 Determine how to preserve the evidence
 Extract, process, and interpret the evidence
 Ensure that the evidence is acceptable in a court of law

Incident: A threatening computer security breach that can be recovered from in a relatively short
period of time.

incident response: The action taken to respond to asituation that can be recovered from relatively
quickly.

security policies: Specifications for a secure environment,including such items as physical security
requirements, network security planning details, a detailed list of approved software, and human
resources policies on employee hiring and dismissal.

The Health Insurance Portability and Accountability Act (HIPAA) of 1996 was enacted on August 21,
1996, to ensure the portability, privacy, and security of medical information.

The Gramm‐Leach‐Bliley (GLB) Act require financial institutions to ensure the security and
confidentiality of the personal information that they collect. This includes information such as names,
addresses, phone numbers, income, and Social Security numbers. Basically, financial institutions are
required to secure customer records and information regardless of size of the information files.

The Sarbanes‐Oxley Act, named for the two Congressmen who sponsored it, was passed to restore
the public’s confidence in corporate governance by requiring chief executives of publicly traded
companies to personally validate financial statements and other information.

The following factors help determine which cases get priority:
• Amount of harm inflicted
• Crime jurisdiction
• Success of investigation
• Availability and training of personnel
• Frequency




2

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller kevintjeuh. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $3.25. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$3.25  8x  sold
  • (1)
  Add to cart