IT Governance, Risk, and Compliance:

Incident Response

1

August 17, 2009  8:26 PM

Preserving Electronically Encoded Evidence – Part IV



Posted by: Robert Davis
Boot, Configuration, Data Acquisition, Electronic Discovery, Event Management, Forensic Imaging Software, Illegal Acts, Incident Handling, Incident Response, Information Security Management, Irregularities, ISM, Law Enforcement

Whether target data is in transit or at rest, it is critical that measures are in place to prevent the sought information from being destroyed, corrupted or becoming unavailable for forensic investigation. When evidence is at rest, adequate procedures should be followed to ensure evidential

August 13, 2009  9:04 PM

Preserving Electronically Encoded Evidence – Part III



Posted by: Robert Davis
Boot, Configuration, Data Acquisition, Electronic Discovery, Event Management, Forensic Imaging Software, Illegal Acts, Incident Handling, Incident Response, Information Security Management, Irregularities, ISM, Law Enforcement

Creating evidential copies through routine backup procedures will only permit replicating specific files while none of the files with delete indicators are recovered, nor the designated 'free space' between files. To remediate this limitation, a


August 10, 2009  7:59 PM

Preserving Electronically Encoded Evidence – Part II



Posted by: Robert Davis
Boot, Configuration, Data Acquisition, Electronic Discovery, Illegal Acts, Incident Handling, Incident Response, Information Security Management, Irregularities, ISM, Law Enforcement

Conditionally, if the target system is turned off, simply turning the technology on and permitting a 'boot' can introduce content changes to files directly or indirectly connected through


August 6, 2009  8:39 PM

Preserving Electronically Encoded Evidence – Part I



Posted by: Robert Davis
Electronic Discovery, Illegal Acts, Incident Handling, Incident Response, Information Security Management, Irregularities, ISM

Seeking to preserve electronically encoded evidence implies an incident or event has occurred that will require facts extrapolation for presentation as...


August 3, 2009  6:16 PM

Critical Incident Response Elements – Part IV



Posted by: Robert Davis
Contingency Management, Incident Response, Information, Management Information System, MIS, Organization, Risk Management, Security Service, Threat Management

Managing an appropriate security incident response is typically a crucial business requirement. To enable effective management, a security MIS should correlate data to intended usage to determine security failure repercussions. Considering the...


July 30, 2009  6:25 PM

Critical Incident Response Elements – Part III



Posted by: Robert Davis
Contingency Management, Incident Response, Information, Management Information System, MIS, Organization, Risk Management, Security Service, Threat Management

There exist various theories concerning managing employees during a crisis scenario. Nevertheless, security incident response tactics should be viewed as a unique application of contingency...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 27, 2009  8:31 PM

Critical Incident Response Elements – Part II



Posted by: Robert Davis
Incident Response, Information, Management Information System, MIS, Organization, Security Service, Threat Management

By definition, an entity's management information system (MIS) represents an aggregation of personnel, computer hardware and software, as well as procedures that process data in order to generate utilizable...


July 23, 2009  4:53 PM

Critical Incident Response Elements – Part I



Posted by: Robert Davis
Incident Response, Information, Management Information System, MIS, Organization, Security Service, Threat Management

Information technology is completely secure when resources are utilized and accessed as intended under all circumstances. Through delegation, every entity manager assumes responsibility for maintaining an adequate control system that safeguards assets. However,


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: