![]() ![]() Volatile evidence should be collected based on the order of volatility that is, the most volatile evidence should be collected first, and the least volatile should be collected last. Module 4 on Introduction to Digital Forensics). There are four phases involved in the initial handling of digital evidence: identification, collection, acquisition, and preservation ( These protocols delineate the steps to be followed when handling digital evidence. Because of its volatility and fragility, protocols need to be followed to ensure that data is not modified during its handling (i.e., during its access, collection, packaging, transfer, and storage). Read more: Cyber Security Coalition,Ĭyber Security Incident Management Guide, 2015.ĭigital evidence is volatile and fragile and the improper handling of this evidence can alter it. The approach taken by the private sector varies by organization and the priorities of the organization. These approaches are not exclusive to the private sector. Because of its primary focus of evidence collection, the recovery from the cybersecurity incident is delayed. The second approach, monitors the cybersecurity incident and focuses on digital forensic applications in order to gather evidence of and information about the incident. Because of its primary focus on swift response and recovery, vital evidence could be lost. There two primary ways of handling a cybersecurity incident: recover quickly or gather evidence (Cyber Security Coalition, 2015): The first approach, recover quickly, is not concerned with the preservation and/or collection of data but the containment of the incident to minimize harm. In the private sector, the response to cybersecurity incidents (e.g., a distributed denial of service attack, unauthorized access to systems, or data breach) includes specific procedures that should be followed to contain the incident, to investigate it and/or to resolve the cybersecurity incident (Cyber Security Coalition, 2015). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |