Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, Massachusetts
Elsevier Science
[2013]
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 |
Beschreibung: | 3.1.5. Impartiality and Independence Print version record |
Beschreibung: | 1 online resource (914 pages) |
ISBN: | 9781597497459 1597497452 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043957893 | ||
003 | DE-604 | ||
005 | 20180717 | ||
007 | cr|uuu---uuuuu | ||
008 | 161213s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781597497459 |9 978-1-59749-745-9 | ||
020 | |a 1597497452 |9 1-59749-745-2 | ||
035 | |a (ZDB-4-EBA)ocn858762090 | ||
035 | |a (ZDB-4-ITC)ocn858762090 | ||
035 | |a (OCoLC)858762090 | ||
035 | |a (DE-599)BVBBV043957893 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1047 |a DE-1046 | ||
082 | 0 | |a 363.250285 | |
082 | 0 | |a 363.25 | |
100 | 1 | |a Watson, David |e Verfasser |4 aut | |
245 | 1 | 0 | |a Digital Forensics Processing and Procedures |b Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements |c David Watson, Andrew Jones ; Frank Thornton, Technical Editor |
264 | 1 | |a Waltham, Massachusetts |b Elsevier Science |c [2013] | |
264 | 4 | |c © 2013 | |
300 | |a 1 online resource (914 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a 3.1.5. Impartiality and Independence | ||
500 | |a Print version record | ||
505 | 8 | |a Front Cover; Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practic ... ; Copyright; Contents; About the Authors; Technical Editor Bio; Acknowledgments; Preface; Chapter 1: Introduction; 1.1. Introduction; 1.1.1. What is Digital Forensics?; 1.1.2. The Need for Digital Forensics; 1.1.3. The Purpose of This Book; 1.1.4. Book Structure; 1.1.5. Who Should Read This Book?; 1.1.6. The Need for Procedures in Digital Forensics; 1.1.7. Problems with Electronic Evidence; 1.1.8. The Principles of Electronic Evidence | |
505 | 8 | |a 1.1.9. Nomenclature Used in This BookAppendix 1 -- Some types of cases involving Digital Forensics; Criminal cases; Civil cases; Appendix 2 -- Growth of hard disk drives for personal computers; Appendix 3 -- Disk drive size nomenclature; Chapter 2: Forensic Laboratory Accommodation; 2.1. The building; 2.1.1. General; 2.1.2. Business Case; 2.1.3. Standards; 2.2. Protecting against external and environmental threats; 2.3. Utilities and services; 2.3.1. Signage; 2.3.2. Power and Cabling; 2.3.3. Heating, Ventilation, and Air Conditioning; 2.3.4. Fire Detection and Quenching | |
505 | 8 | |a 2.3.5. Close Circuit Television and Burglar Alarms2.3.6. Communications; 2.3.7. Water; 2.4. Physical security; 2.4.1. General; 2.4.2. Building Infrastructure; 2.4.3. Access Control; 2.4.4. On-Site Secure Evidence Storage; 2.4.5. Clean Room; 2.4.6. Fire Safes; 2.4.7. Secure Off-Site Storage; 2.5. Layout of the Forensic Laboratory; 2.5.1. Separation of Space for Specific Roles and Tasks; 2.5.2. Ergonomics; 2.5.3. Personal Workspace; 2.5.4. Size Estimating; 2.5.5. Infrastructure Rooms; Appendix 1 -- Sample outline for a business case; Appendix 2 -- Forensic Laboratory Physical Security Policy | |
505 | 8 | |a IntroductionPurpose; Definitions; Scope; Audience; Policy statements; Responsibilities; Enforcement, monitoring, and breaches; Ownership; Review and maintenance; Approval; Chapter 3: Setting up the Forensic Laboratory; 3.1. Setting up the Forensic Laboratory; 3.1.1. Forensic Laboratory Terms of Reference; 3.1.2. The Status of the Forensic Laboratory; 3.1.3. The Forensic Laboratory Principles; 3.1.3.1. Responsibilities; 3.1.3.2. Integrity; 3.1.3.3. Quality; 3.1.3.4. Efficiency; 3.1.3.5. Productivity; 3.1.3.6. Meet Organizational Expectations; 3.1.3.7. Health and Safety | |
505 | 8 | |a 3.1.3.8. Information Security3.1.3.9. Management Information Systems; 3.1.3.10. Qualifications; 3.1.3.11. Training; 3.1.3.12. Maintaining Employee Competency; 3.1.3.13. Employee Development; 3.1.3.14. Environment; 3.1.3.15. Supervision; 3.1.3.16. Conflicts of Interest; 3.1.3.17. Legal Compliance; 3.1.3.18. Accountability; 3.1.3.19. Disclosure and Discovery; 3.1.3.20. Work Quality; 3.1.3.21. Accreditation and Certification; 3.1.3.22. Membership of Appropriate Organizations; 3.1.3.23. Obtain Appropriate Personal Certifications; 3.1.4. Laboratory Service Level Agreements | |
505 | 8 | |a This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. A step-by-step guide to designing, building a | |
650 | 7 | |a BUSINESS & ECONOMICS / Infrastructure |2 bisacsh | |
650 | 7 | |a SOCIAL SCIENCE / General |2 bisacsh | |
650 | 4 | |a Computer crimes / Investigation | |
650 | 4 | |a Computer science | |
650 | 4 | |a Evidence preservation / Standards | |
650 | 4 | |a Forensic sciences / Standards | |
650 | 4 | |a Informatik | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Computer crimes |x Investigation |a Evidence preservation |x Standards |a Forensic sciences |x Standards |a Computer science | |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Jones, Andrew |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Watson, David |t Digital Forensics Processing and Procedures : Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements |
912 | |a ZDB-4-EBA |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029366596 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=485049 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=485049 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176912155672576 |
---|---|
any_adam_object | |
author | Watson, David |
author_facet | Watson, David |
author_role | aut |
author_sort | Watson, David |
author_variant | d w dw |
building | Verbundindex |
bvnumber | BV043957893 |
collection | ZDB-4-EBA ZDB-4-ITC |
contents | Front Cover; Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practic ... ; Copyright; Contents; About the Authors; Technical Editor Bio; Acknowledgments; Preface; Chapter 1: Introduction; 1.1. Introduction; 1.1.1. What is Digital Forensics?; 1.1.2. The Need for Digital Forensics; 1.1.3. The Purpose of This Book; 1.1.4. Book Structure; 1.1.5. Who Should Read This Book?; 1.1.6. The Need for Procedures in Digital Forensics; 1.1.7. Problems with Electronic Evidence; 1.1.8. The Principles of Electronic Evidence 1.1.9. Nomenclature Used in This BookAppendix 1 -- Some types of cases involving Digital Forensics; Criminal cases; Civil cases; Appendix 2 -- Growth of hard disk drives for personal computers; Appendix 3 -- Disk drive size nomenclature; Chapter 2: Forensic Laboratory Accommodation; 2.1. The building; 2.1.1. General; 2.1.2. Business Case; 2.1.3. Standards; 2.2. Protecting against external and environmental threats; 2.3. Utilities and services; 2.3.1. Signage; 2.3.2. Power and Cabling; 2.3.3. Heating, Ventilation, and Air Conditioning; 2.3.4. Fire Detection and Quenching 2.3.5. Close Circuit Television and Burglar Alarms2.3.6. Communications; 2.3.7. Water; 2.4. Physical security; 2.4.1. General; 2.4.2. Building Infrastructure; 2.4.3. Access Control; 2.4.4. On-Site Secure Evidence Storage; 2.4.5. Clean Room; 2.4.6. Fire Safes; 2.4.7. Secure Off-Site Storage; 2.5. Layout of the Forensic Laboratory; 2.5.1. Separation of Space for Specific Roles and Tasks; 2.5.2. Ergonomics; 2.5.3. Personal Workspace; 2.5.4. Size Estimating; 2.5.5. Infrastructure Rooms; Appendix 1 -- Sample outline for a business case; Appendix 2 -- Forensic Laboratory Physical Security Policy IntroductionPurpose; Definitions; Scope; Audience; Policy statements; Responsibilities; Enforcement, monitoring, and breaches; Ownership; Review and maintenance; Approval; Chapter 3: Setting up the Forensic Laboratory; 3.1. Setting up the Forensic Laboratory; 3.1.1. Forensic Laboratory Terms of Reference; 3.1.2. The Status of the Forensic Laboratory; 3.1.3. The Forensic Laboratory Principles; 3.1.3.1. Responsibilities; 3.1.3.2. Integrity; 3.1.3.3. Quality; 3.1.3.4. Efficiency; 3.1.3.5. Productivity; 3.1.3.6. Meet Organizational Expectations; 3.1.3.7. Health and Safety 3.1.3.8. Information Security3.1.3.9. Management Information Systems; 3.1.3.10. Qualifications; 3.1.3.11. Training; 3.1.3.12. Maintaining Employee Competency; 3.1.3.13. Employee Development; 3.1.3.14. Environment; 3.1.3.15. Supervision; 3.1.3.16. Conflicts of Interest; 3.1.3.17. Legal Compliance; 3.1.3.18. Accountability; 3.1.3.19. Disclosure and Discovery; 3.1.3.20. Work Quality; 3.1.3.21. Accreditation and Certification; 3.1.3.22. Membership of Appropriate Organizations; 3.1.3.23. Obtain Appropriate Personal Certifications; 3.1.4. Laboratory Service Level Agreements This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. A step-by-step guide to designing, building a |
ctrlnum | (ZDB-4-EBA)ocn858762090 (ZDB-4-ITC)ocn858762090 (OCoLC)858762090 (DE-599)BVBBV043957893 |
dewey-full | 363.250285 363.25 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.250285 363.25 |
dewey-search | 363.250285 363.25 |
dewey-sort | 3363.250285 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06059nmm a2200637zc 4500</leader><controlfield tag="001">BV043957893</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180717 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161213s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597497459</subfield><subfield code="9">978-1-59749-745-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597497452</subfield><subfield code="9">1-59749-745-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn858762090</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn858762090</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)858762090</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043957893</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1047</subfield><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.250285</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Watson, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital Forensics Processing and Procedures</subfield><subfield code="b">Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements</subfield><subfield code="c">David Watson, Andrew Jones ; Frank Thornton, Technical Editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Massachusetts</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (914 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">3.1.5. Impartiality and Independence</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Front Cover; Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practic ... ; Copyright; Contents; About the Authors; Technical Editor Bio; Acknowledgments; Preface; Chapter 1: Introduction; 1.1. Introduction; 1.1.1. What is Digital Forensics?; 1.1.2. The Need for Digital Forensics; 1.1.3. The Purpose of This Book; 1.1.4. Book Structure; 1.1.5. Who Should Read This Book?; 1.1.6. The Need for Procedures in Digital Forensics; 1.1.7. Problems with Electronic Evidence; 1.1.8. The Principles of Electronic Evidence</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1.1.9. Nomenclature Used in This BookAppendix 1 -- Some types of cases involving Digital Forensics; Criminal cases; Civil cases; Appendix 2 -- Growth of hard disk drives for personal computers; Appendix 3 -- Disk drive size nomenclature; Chapter 2: Forensic Laboratory Accommodation; 2.1. The building; 2.1.1. General; 2.1.2. Business Case; 2.1.3. Standards; 2.2. Protecting against external and environmental threats; 2.3. Utilities and services; 2.3.1. Signage; 2.3.2. Power and Cabling; 2.3.3. Heating, Ventilation, and Air Conditioning; 2.3.4. Fire Detection and Quenching</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.3.5. Close Circuit Television and Burglar Alarms2.3.6. Communications; 2.3.7. Water; 2.4. Physical security; 2.4.1. General; 2.4.2. Building Infrastructure; 2.4.3. Access Control; 2.4.4. On-Site Secure Evidence Storage; 2.4.5. Clean Room; 2.4.6. Fire Safes; 2.4.7. Secure Off-Site Storage; 2.5. Layout of the Forensic Laboratory; 2.5.1. Separation of Space for Specific Roles and Tasks; 2.5.2. Ergonomics; 2.5.3. Personal Workspace; 2.5.4. Size Estimating; 2.5.5. Infrastructure Rooms; Appendix 1 -- Sample outline for a business case; Appendix 2 -- Forensic Laboratory Physical Security Policy</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">IntroductionPurpose; Definitions; Scope; Audience; Policy statements; Responsibilities; Enforcement, monitoring, and breaches; Ownership; Review and maintenance; Approval; Chapter 3: Setting up the Forensic Laboratory; 3.1. Setting up the Forensic Laboratory; 3.1.1. Forensic Laboratory Terms of Reference; 3.1.2. The Status of the Forensic Laboratory; 3.1.3. The Forensic Laboratory Principles; 3.1.3.1. Responsibilities; 3.1.3.2. Integrity; 3.1.3.3. Quality; 3.1.3.4. Efficiency; 3.1.3.5. Productivity; 3.1.3.6. Meet Organizational Expectations; 3.1.3.7. Health and Safety</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.1.3.8. Information Security3.1.3.9. Management Information Systems; 3.1.3.10. Qualifications; 3.1.3.11. Training; 3.1.3.12. Maintaining Employee Competency; 3.1.3.13. Employee Development; 3.1.3.14. Environment; 3.1.3.15. Supervision; 3.1.3.16. Conflicts of Interest; 3.1.3.17. Legal Compliance; 3.1.3.18. Accountability; 3.1.3.19. Disclosure and Discovery; 3.1.3.20. Work Quality; 3.1.3.21. Accreditation and Certification; 3.1.3.22. Membership of Appropriate Organizations; 3.1.3.23. Obtain Appropriate Personal Certifications; 3.1.4. Laboratory Service Level Agreements</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. A step-by-step guide to designing, building a</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Infrastructure</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Evidence preservation / Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic sciences / Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield><subfield code="a">Evidence preservation</subfield><subfield code="x">Standards</subfield><subfield code="a">Forensic sciences</subfield><subfield code="x">Standards</subfield><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jones, Andrew</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Watson, David</subfield><subfield code="t">Digital Forensics Processing and Procedures : Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029366596</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=485049</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=485049</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043957893 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:39:43Z |
institution | BVB |
isbn | 9781597497459 1597497452 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029366596 |
oclc_num | 858762090 |
open_access_boolean | |
owner | DE-1047 DE-1046 |
owner_facet | DE-1047 DE-1046 |
physical | 1 online resource (914 pages) |
psigel | ZDB-4-EBA ZDB-4-ITC ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Elsevier Science |
record_format | marc |
spelling | Watson, David Verfasser aut Digital Forensics Processing and Procedures Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements David Watson, Andrew Jones ; Frank Thornton, Technical Editor Waltham, Massachusetts Elsevier Science [2013] © 2013 1 online resource (914 pages) txt rdacontent c rdamedia cr rdacarrier 3.1.5. Impartiality and Independence Print version record Front Cover; Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practic ... ; Copyright; Contents; About the Authors; Technical Editor Bio; Acknowledgments; Preface; Chapter 1: Introduction; 1.1. Introduction; 1.1.1. What is Digital Forensics?; 1.1.2. The Need for Digital Forensics; 1.1.3. The Purpose of This Book; 1.1.4. Book Structure; 1.1.5. Who Should Read This Book?; 1.1.6. The Need for Procedures in Digital Forensics; 1.1.7. Problems with Electronic Evidence; 1.1.8. The Principles of Electronic Evidence 1.1.9. Nomenclature Used in This BookAppendix 1 -- Some types of cases involving Digital Forensics; Criminal cases; Civil cases; Appendix 2 -- Growth of hard disk drives for personal computers; Appendix 3 -- Disk drive size nomenclature; Chapter 2: Forensic Laboratory Accommodation; 2.1. The building; 2.1.1. General; 2.1.2. Business Case; 2.1.3. Standards; 2.2. Protecting against external and environmental threats; 2.3. Utilities and services; 2.3.1. Signage; 2.3.2. Power and Cabling; 2.3.3. Heating, Ventilation, and Air Conditioning; 2.3.4. Fire Detection and Quenching 2.3.5. Close Circuit Television and Burglar Alarms2.3.6. Communications; 2.3.7. Water; 2.4. Physical security; 2.4.1. General; 2.4.2. Building Infrastructure; 2.4.3. Access Control; 2.4.4. On-Site Secure Evidence Storage; 2.4.5. Clean Room; 2.4.6. Fire Safes; 2.4.7. Secure Off-Site Storage; 2.5. Layout of the Forensic Laboratory; 2.5.1. Separation of Space for Specific Roles and Tasks; 2.5.2. Ergonomics; 2.5.3. Personal Workspace; 2.5.4. Size Estimating; 2.5.5. Infrastructure Rooms; Appendix 1 -- Sample outline for a business case; Appendix 2 -- Forensic Laboratory Physical Security Policy IntroductionPurpose; Definitions; Scope; Audience; Policy statements; Responsibilities; Enforcement, monitoring, and breaches; Ownership; Review and maintenance; Approval; Chapter 3: Setting up the Forensic Laboratory; 3.1. Setting up the Forensic Laboratory; 3.1.1. Forensic Laboratory Terms of Reference; 3.1.2. The Status of the Forensic Laboratory; 3.1.3. The Forensic Laboratory Principles; 3.1.3.1. Responsibilities; 3.1.3.2. Integrity; 3.1.3.3. Quality; 3.1.3.4. Efficiency; 3.1.3.5. Productivity; 3.1.3.6. Meet Organizational Expectations; 3.1.3.7. Health and Safety 3.1.3.8. Information Security3.1.3.9. Management Information Systems; 3.1.3.10. Qualifications; 3.1.3.11. Training; 3.1.3.12. Maintaining Employee Competency; 3.1.3.13. Employee Development; 3.1.3.14. Environment; 3.1.3.15. Supervision; 3.1.3.16. Conflicts of Interest; 3.1.3.17. Legal Compliance; 3.1.3.18. Accountability; 3.1.3.19. Disclosure and Discovery; 3.1.3.20. Work Quality; 3.1.3.21. Accreditation and Certification; 3.1.3.22. Membership of Appropriate Organizations; 3.1.3.23. Obtain Appropriate Personal Certifications; 3.1.4. Laboratory Service Level Agreements This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. A step-by-step guide to designing, building a BUSINESS & ECONOMICS / Infrastructure bisacsh SOCIAL SCIENCE / General bisacsh Computer crimes / Investigation Computer science Evidence preservation / Standards Forensic sciences / Standards Informatik Wirtschaft Computer crimes Investigation Evidence preservation Standards Forensic sciences Standards Computer science Computerforensik (DE-588)4774034-6 gnd rswk-swf Computerforensik (DE-588)4774034-6 s 1\p DE-604 Jones, Andrew Sonstige oth Erscheint auch als Druck-Ausgabe Watson, David Digital Forensics Processing and Procedures : Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Watson, David Digital Forensics Processing and Procedures Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements Front Cover; Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practic ... ; Copyright; Contents; About the Authors; Technical Editor Bio; Acknowledgments; Preface; Chapter 1: Introduction; 1.1. Introduction; 1.1.1. What is Digital Forensics?; 1.1.2. The Need for Digital Forensics; 1.1.3. The Purpose of This Book; 1.1.4. Book Structure; 1.1.5. Who Should Read This Book?; 1.1.6. The Need for Procedures in Digital Forensics; 1.1.7. Problems with Electronic Evidence; 1.1.8. The Principles of Electronic Evidence 1.1.9. Nomenclature Used in This BookAppendix 1 -- Some types of cases involving Digital Forensics; Criminal cases; Civil cases; Appendix 2 -- Growth of hard disk drives for personal computers; Appendix 3 -- Disk drive size nomenclature; Chapter 2: Forensic Laboratory Accommodation; 2.1. The building; 2.1.1. General; 2.1.2. Business Case; 2.1.3. Standards; 2.2. Protecting against external and environmental threats; 2.3. Utilities and services; 2.3.1. Signage; 2.3.2. Power and Cabling; 2.3.3. Heating, Ventilation, and Air Conditioning; 2.3.4. Fire Detection and Quenching 2.3.5. Close Circuit Television and Burglar Alarms2.3.6. Communications; 2.3.7. Water; 2.4. Physical security; 2.4.1. General; 2.4.2. Building Infrastructure; 2.4.3. Access Control; 2.4.4. On-Site Secure Evidence Storage; 2.4.5. Clean Room; 2.4.6. Fire Safes; 2.4.7. Secure Off-Site Storage; 2.5. Layout of the Forensic Laboratory; 2.5.1. Separation of Space for Specific Roles and Tasks; 2.5.2. Ergonomics; 2.5.3. Personal Workspace; 2.5.4. Size Estimating; 2.5.5. Infrastructure Rooms; Appendix 1 -- Sample outline for a business case; Appendix 2 -- Forensic Laboratory Physical Security Policy IntroductionPurpose; Definitions; Scope; Audience; Policy statements; Responsibilities; Enforcement, monitoring, and breaches; Ownership; Review and maintenance; Approval; Chapter 3: Setting up the Forensic Laboratory; 3.1. Setting up the Forensic Laboratory; 3.1.1. Forensic Laboratory Terms of Reference; 3.1.2. The Status of the Forensic Laboratory; 3.1.3. The Forensic Laboratory Principles; 3.1.3.1. Responsibilities; 3.1.3.2. Integrity; 3.1.3.3. Quality; 3.1.3.4. Efficiency; 3.1.3.5. Productivity; 3.1.3.6. Meet Organizational Expectations; 3.1.3.7. Health and Safety 3.1.3.8. Information Security3.1.3.9. Management Information Systems; 3.1.3.10. Qualifications; 3.1.3.11. Training; 3.1.3.12. Maintaining Employee Competency; 3.1.3.13. Employee Development; 3.1.3.14. Environment; 3.1.3.15. Supervision; 3.1.3.16. Conflicts of Interest; 3.1.3.17. Legal Compliance; 3.1.3.18. Accountability; 3.1.3.19. Disclosure and Discovery; 3.1.3.20. Work Quality; 3.1.3.21. Accreditation and Certification; 3.1.3.22. Membership of Appropriate Organizations; 3.1.3.23. Obtain Appropriate Personal Certifications; 3.1.4. Laboratory Service Level Agreements This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. A step-by-step guide to designing, building a BUSINESS & ECONOMICS / Infrastructure bisacsh SOCIAL SCIENCE / General bisacsh Computer crimes / Investigation Computer science Evidence preservation / Standards Forensic sciences / Standards Informatik Wirtschaft Computer crimes Investigation Evidence preservation Standards Forensic sciences Standards Computer science Computerforensik (DE-588)4774034-6 gnd |
subject_GND | (DE-588)4774034-6 |
title | Digital Forensics Processing and Procedures Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements |
title_auth | Digital Forensics Processing and Procedures Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements |
title_exact_search | Digital Forensics Processing and Procedures Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements |
title_full | Digital Forensics Processing and Procedures Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements David Watson, Andrew Jones ; Frank Thornton, Technical Editor |
title_fullStr | Digital Forensics Processing and Procedures Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements David Watson, Andrew Jones ; Frank Thornton, Technical Editor |
title_full_unstemmed | Digital Forensics Processing and Procedures Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements David Watson, Andrew Jones ; Frank Thornton, Technical Editor |
title_short | Digital Forensics Processing and Procedures |
title_sort | digital forensics processing and procedures meeting the requirements of iso 17020 iso 17025 iso 27001 and best practice requirements |
title_sub | Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements |
topic | BUSINESS & ECONOMICS / Infrastructure bisacsh SOCIAL SCIENCE / General bisacsh Computer crimes / Investigation Computer science Evidence preservation / Standards Forensic sciences / Standards Informatik Wirtschaft Computer crimes Investigation Evidence preservation Standards Forensic sciences Standards Computer science Computerforensik (DE-588)4774034-6 gnd |
topic_facet | BUSINESS & ECONOMICS / Infrastructure SOCIAL SCIENCE / General Computer crimes / Investigation Computer science Evidence preservation / Standards Forensic sciences / Standards Informatik Wirtschaft Computer crimes Investigation Evidence preservation Standards Forensic sciences Standards Computer science Computerforensik |
work_keys_str_mv | AT watsondavid digitalforensicsprocessingandproceduresmeetingtherequirementsofiso17020iso17025iso27001andbestpracticerequirements AT jonesandrew digitalforensicsprocessingandproceduresmeetingtherequirementsofiso17020iso17025iso27001andbestpracticerequirements |