Wednesday, June 20, 2007

Digital Forensics and Hacking Investigations, Part 3

In Part 3 of this series, we discuss the initial crime scene investigative process; chain of custody and collecting evidence; civil vs. criminal investigations; limiting exposure to evidence; incident response and NIST Special Publication 800-61; BIOS analysis and understanding clock skew; the art of onsite diplomacy; probable cause and search warrants; the consent required to monitor network traffic; network forensics and the requirement for system banners, acceptable use policies, and third-party consent; consent and keystroke loggers; how law enforcement uses search warrants; the plain view doctrine; international issues with investigating computer crime; what are “artifacts”; acceptable use policies and outside contractors; initial computer forensic investigation methodology; introduction to flowcharting tools; determining required resources for a computer misuse investigation; initial risk assessment for computer crime; conveying electronic discovery concepts in layman’s terms; post action reviews for e-discovery exercises; initial operating system identification for onsite forensic analysis; and more.


This LiveAmmo Podcast is in .mp3 format, 00:46:08 in duration, and a 22.14 MB download.


Visit the LiveAmmo Computer Forensics Podcast Archives for more information about how to subscribe to our podcasts and news feeds.




No comments:

Post a Comment