Building a Business Case for Computer Forensics

نویسنده

  • Kelly J. Kuchta
چکیده

client’s recent experience with a mysterious and unexpected crash of its servers demonstrates the value of having good information. The crash caused the loss of data to that client’s critical Accounts Payable and Accounts Receivable records that kept its banker informed of the company’s financial state. After making an initial assessment of the issue, the company inquired about the use of computer forensic services to identify the source and come up with a remedy. A week after pursuing answers through some of its product vendors produced a lot of frustration and no answers, the services of a computer forensic professional were requested. On day one, the forensic expert identified the potential source. Day two produced a confirmation of what was suspected on day one. By the end of day three, the company was back to business as usual. All of this was possible because information about the incident was available. In a previous issue, I pointed out that computers capture large amounts of information. Deleted files, revisions, and information about user activities are readily available to a computer forensic professional. Today, almost every piece of paper with information on it is or was in a digital format at one time. Events that occur on or over the computer hold key pieces of information vital in answering the what, who, when, where, and how of a particular issue. Unfortunately, most of this information is not found in plain view. Technology is every malcontent’s dream come true. It provides anonymity and allows malicious individuals to perform their actions from remote places. Are you swimming in information? If you answered “yes,” is it the right kind of information? Often, the key ingredient that makes information systems valuable is having good information. Having the right quality and quantity of information makes decisions timely, effective, and result oriented. Inquiring about a comA

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Introduction to Computer Forensics: Gathering Evidence in a Computing Environment

Business has become increasingly dependent on the Internet and computing to operate. It has become apparent that there are issues of evidence gathering in a computing environment which by their nature are technical and different to other forms of evidence gathering, that must be addressed. This paper offers an introduction to some of the technical issues surrounding this new and specialized fie...

متن کامل

Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility. By A. Jones and C. Valli

Like so many things in our just-in-time world, this book was sent to me just as one of my colleagues was looking for a text for a course he was developing in computer forensics laboratory operations and management. The two lead authors—and contributing author P. Swinburne—bring decades of experience in military and law enforcement environments in Australia and the UK to these topics. The book p...

متن کامل

Computer Forensics in the Global Enterprise

The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow a corporation to self-regulate and investigate their infrastructure with a significantly increased level of assurance; identifying the root cause of an incident and verifying the integrity of critical information. Man...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

A Novel Model for Bus Stop Location Appropriate for Public Transit Network Design: The Case of Central Business Districts (CBD) of Tehran

In this paper, a novel multi-objective bus stop location model is proposed, which considers not only the coverage of demand and minimization of access time but also the necessities of suitable stops for transit network design phase. Three objective functions are considered including minimizing (I) sum of the total access distance (time), (II) the weighted combination of stops, and (III) the num...

متن کامل

Countering Counter-Forensics: The Case of JPEG Compression

This paper summarizes several iterations in the cat-andmouse game between digital image forensics and counter-forensics related to an image’s JPEG compression history. Building on the counterforensics algorithm by Stamm et al. [1], we point out a vulnerability in this scheme when a maximum likelihood estimator has no solution. We construct a targeted detector against it, and present an improved...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Information Systems Security

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2000