Network Forensics

1309 Words3 Pages

Most small to mid-size corporations cannot afford a complete Computer Emergency Response Team (CERT). A lot of large outsource this operation as well. The team being internal or external makes a significant difference in the first stages of an investigation. We will assume that we are working as a forensic contractor. Given the most opportune situation our forensic team should consist of multiple job titles, but some of these may be held by the same person. One very important position is a legal representative. This may come from within the public relations department of the company that has hired you, but it is usually a good idea to have someone with extensive legal knowledge to guide in the process and ensure the data is admissible in court. There should be CERT team leader that coordinates and reviews all of the actions of the team. Each incident should also have an incident lead. This incident lead may vary depending upon the type of intrusion, or the CERT leader may be the incident leader as well. You will also have CERT members that specialize in various areas. This may include IPS and IDS experts, specific operating system experts, and/or web server experts (“Responding to IT Security Incidents). The response plan should be in place prior to any incident occurring. This should include a forensic tool chest, a mobile one is best if possible (all tools need to be tested prior to use). The plan typically follows a general form for most incidents and most organizations. The incident is reported. The initial assessment is made, including information in regards to the network. The investigation then begins with evidence gathering based upon the type of incident and information we already know from our initial as... ... middle of paper ... ...oi: 10.1016. Retrieved from https://wiki.engr.illinois.edu/download/attachments/203948055/1-s2-1.0-S1742287605000940-main.pdf?version=1&modificationDate=1351890428000 Collie, Byron. "INTRUSION INVESTIGATION AND POST-INTRUSION COMPUTER FORENSIC ANALYSIS." INTRUSION INVESTIGATION AND POST-INTRUSION COMPUTER FORENSIC ANALYSIS. N.p., n.d. Web. 17 Jan. 2014. . Hill, B., & O’Boyle, T. (2000, August). (2000, August). Cyber Detectives employ Intrusion Detection Systems and Forensics. Retrieved from http://www.mitre.org/news/the_edge/february_01/oboyle.html "Responding to IT Security Incidents." Responding to IT Security Incidents. N.p., n.d. Web. 19 Jan. 2014. .

More about Network Forensics

Open Document