CHFI v3 Module 03 Computer Investigation Process.pdf
(
3529 KB
)
Pobierz
Computer Hacking
Forensic Investigator
Module III:
Computer Investigation
Process
Scenario
Jim works as a Technical Resource Developer in a
reputed firm. In recent days, Jim has been working till
late night. It seemed as if he is trying to meet his
Project deadlines.
The extra effort put in by Jim did not produce any
results and his Project Manager got suspicious.
Is Jim indulging in activities in violation to company
Policies?
Is he hiding his activities by deleting stuff?
What means can he implement to hide his activities?
Does he leave some prominent traces behind such as
Pen drives, Floppies, or papers with notes?
EC-Council
Copyright © by
EC-Council
All rights reserved. Reproduction is strictly prohibited
Module Objective
This module will familiarize you with the following:
Investigating Computer Crime
Policy and Procedure Development
Investigating a Company Policy Violation
Accessing Policy Violation Case: Example
Methodology of investigation
Evaluating the case
Investigation plan
Obtaining Search Warrant
Warning Banners
Shutdown the Computer
Collecting the Evidence
Implementing an investigation
Imaging the Evidence Disk
Examining the Digital Evidence
Closing the case
Evaluating the case
EC-Council
Copyright © by
EC-Council
All rights reserved. Reproduction is strictly prohibited
Module Flow
Investigating
Computer Crime
Investigating
Company Policy Violation
Policy And Procedure
Development
Investigating Methodology
Evaluating The Case
Investigation Plan
Collecting The Evidence
Implementing An
Investigation
Warning Banners
Examining
The Digital Evidence
Case Evaluation
EC-Council
Closing The Case
Copyright © by
EC-Council
All rights reserved. Reproduction is strictly prohibited
Investigating Computer Crime
Determine if an incident has occurred
Find and interpret the clues left behind
Do preliminary assessment to search for the evidence
Search and seize the computer equipments
Collect evidence that can be offered in the court of law or
at a corporate inquiry
p
q y
EC-Council
Copyright © by
EC-Council
All rights reserved. Reproduction is strictly prohibited
Plik z chomika:
qfx
Inne pliki z tego folderu:
CHFI v3 Module 02 Law and Computer Forensics.pdf
(2867 KB)
CHFI v3 Module 03 Computer Investigation Process.pdf
(3529 KB)
CHFI v3 Module 04 First Responder Procedures.pdf
(2317 KB)
CHFI v3 Module 05 CSIRT.pdf
(2815 KB)
CHFI v3 Module 01 Computer Forensics in Todays World.pdf
(1418 KB)
Inne foldery tego chomika:
Advanced Cisco Study Using GNS3 Videos
Advanced Juniper Networks Routing in the Enterprise Detailed Lab Guide
Billing with Stripe (kefirm)
Blackhat & Defcon 2009 Conf CDs Present Jul 2009
Bootsrap - Tutsplus - Bootstrap 3.0 Essentials
Zgłoś jeśli
naruszono regulamin