National Open University Library

Image from Google Jackets

Implementing digital forensic readiness :

By: Sachowski, JasonMaterial type: TextTextDescription: xvii, 355 pages : illustrationsISBN: 9780128044544Subject(s): Computer crimes | Digital forensic science
Contents:
Understanding digital forensics -- Investigate process models -- Evidence management -- Understanding forensic readiness -- Define business risk scenarios -- Identity potential data sources -- Determine collection requirements -- Establish legal admissibility -- Establish secure storage and handling -- Enable targeted monitoring -- Map investigative workflows -- Establish continuing education -- Maintain evidence-based reporting -- Ensure legal review -- Accomplishing forensic readiness -- Appendices: A. Investigative process models -- B. Education and professional certifications -- C. Tool and equipment validation program -- D. Service catalog -- E. Cost-benefit analysis -- F. Building taxonomy -- G. Risk assessment -- H. Threat modeling -- I. Data warehouse introduction -- J. Requirements analysis -- K. Investigative workflow -- Templates: A. Test case document -- B. Investigator logbook -- C. Chain of custody tracking form -- D. Investigative final report -- E. Service catalog -- F. Business case document -- G. Net present value -- H. Threat/risk assessment report -- I. Data source inventory matrix -- J. Project charter document -- K. Requirements specification document.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Books Gabriel Afolabi Ojo Central Library (Headquarters).
HV8079 .S23 2016 (Browse shelf(Opens below)) Available 0160644
Books Books Gabriel Afolabi Ojo Central Library (Headquarters).
HV8079 .S23 2016 (Browse shelf(Opens below)) Available 0163661

Minimal Level Cataloging Plus.

Understanding digital forensics -- Investigate process models -- Evidence management -- Understanding forensic readiness -- Define business risk scenarios -- Identity potential data sources -- Determine collection requirements -- Establish legal admissibility -- Establish secure storage and handling -- Enable targeted monitoring -- Map investigative workflows -- Establish continuing education -- Maintain evidence-based reporting -- Ensure legal review -- Accomplishing forensic readiness -- Appendices: A. Investigative process models -- B. Education and professional certifications -- C. Tool and equipment validation program -- D. Service catalog -- E. Cost-benefit analysis -- F. Building taxonomy -- G. Risk assessment -- H. Threat modeling -- I. Data warehouse introduction -- J. Requirements analysis -- K. Investigative workflow -- Templates: A. Test case document -- B. Investigator logbook -- C. Chain of custody tracking form -- D. Investigative final report -- E. Service catalog -- F. Business case document -- G. Net present value -- H. Threat/risk assessment report -- I. Data source inventory matrix -- J. Project charter document -- K. Requirements specification document.

There are no comments on this title.

to post a comment.

Powered by Koha

//