Uploaded on Dec 6, 2021
Cyber forensics is the process of finding, collecting, preserving, and analyzing data for evidence in computer-related crimes. When someone suspects that their business has been hacked or an employee uses their position to steal data it's time to call in the cyber forensics team. There are three basic steps in this process: Investigation, Analysis, and Presentation. The investigation starts by taking apart the network (or at least isolating compromised hosts) to make sure nothing can propagate across machines or infect other people's systems. Then there's a lot of looking around at user behavior; when did they log on? What were they working on? Which external IP addresses were used recently? And then there's making copies of hard drives (if appropriate) for analysis.
Corporate Cyber Forensics
Corporate Cyber Forensics
Cyber forensics is the process of finding, collecting, preserving, and
analyzing data for evidence in computer-related crimes. When
someone suspects that their business has been hacked or an
employee uses their position to steal data it's time to call in the
cyber forensics team. There are three basic steps in this process:
Investigation, Analysis, and Presentation.
Investigation
The investigation starts by taking apart the network (or at least
isolating compromised hosts) to make sure nothing can propagate
across machines or infect other people's systems. Then there's a lot
of looking around at user behavior; when did they log on? What were
they working on? Which external IP addresses were used recently?
And then there's making copies of hard drives (if appropriate) for
analysis.
Analysis
The next stage is staging the data to make it presentable to the
analysts who will do the real work. This means organizing all of the
information according to time, date and files accessed. It's also
critical that this process be done completely in-house to guarantee
nothing is lost or tainted during copying over externally e.g., via
network traffic dumps).
The last step in this phase is scrubbing out any personally identifiable
information which could get into the wrong hands if it fell into
someone else's investigation e.g., being subpoenaed by legal counsel
on behalf of a client). With this preparation phase complete,
investigators are ready to begin analyzing the collected data to find
incriminating evidence against employees or other wrong-doers.
More about Corporate Cyber Forensics
Presentation
Once the analysis is complete, the findings must be presented in a
way that makes them understandable and useful to whoever is in
charge of making decisions - whether that's the board of directors or
law enforcement. The presentation should include not just what was
found but how it was found and what implications it has for the
company.
It's also important to remember that cyber forensics is an evolving
field, so any new techniques or methods used during the
investigation should be included in the presentation as well. This
ensures that those in charge are aware of potential future threats and
can take steps to prevent them from happening.
In short, cyber forensics is a critical process for businesses (and
individuals) who want to make sure that they're taking all the
necessary precautions to protect themselves from computer-related
crimes. By following the three basic steps of investigation, analysis
and presentation, businesses can rest assured that they're doing
everything possible to get to the bottom of any potential security
breaches.
Comments