LEADER 05686nam 2200733 450 001 9910452749303321 005 20200520144314.0 010 $a1-59749-745-2 035 $a(CKB)2550000001114693 035 $a(EBL)1115161 035 $a(OCoLC)858762090 035 $a(SSID)ssj0001058830 035 $a(PQKBManifestationID)11585837 035 $a(PQKBTitleCode)TC0001058830 035 $a(PQKBWorkID)11070336 035 $a(PQKB)10346139 035 $a(MiAaPQ)EBC1115161 035 $a(CaSebORM)9781597497428 035 $a(PPN)178539929 035 $a(Au-PeEL)EBL1115161 035 $a(CaPaEBR)ebr10755369 035 $a(CaONFJC)MIL514565 035 $a(EXLCZ)992550000001114693 100 $a20130606h20132013 uy| 0 101 0 $aeng 135 $aurunu||||| 181 $ctxt 182 $cc 183 $acr 200 10$aDigital forensics processing and procedures $emeeting the requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements /$fDavid Watson, Andrew Jones 205 $a1st edition 210 1$aAmsterdam :$cSyngress,$d[2013] 210 4$dİ2013 215 $a1 online resource (914 p.) 300 $aDescription based upon print version of record. 311 $a1-59749-742-8 311 $a1-299-83314-4 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practices ...; Copyright; Contents; About the Authors; Technical Editor Bio; Acknowledgments; Preface; Chapter 1: Introduction; 1.1. Introduction; 1.1.1. What is Digital Forensics?; 1.1.2. The Need for Digital Forensics; 1.1.3. The Purpose of This Book; 1.1.4. Book Structure; 1.1.5. Who Should Read This Book?; 1.1.6. The Need for Procedures in Digital Forensics; 1.1.7. Problems with Electronic Evidence; 1.1.8. The Principles of Electronic Evidence 327 $a1.1.9. Nomenclature Used in This Book Appendix 1 - Some types of cases involving Digital Forensics; Criminal cases; Civil cases; Appendix 2 - Growth of hard disk drives for personal computers; Appendix 3 - Disk drive size nomenclature; Chapter 2: Forensic Laboratory Accommodation; 2.1. The building; 2.1.1. General; 2.1.2. Business Case; 2.1.3. Standards; 2.2. Protecting against external and environmental threats; 2.3. Utilities and services; 2.3.1. Signage; 2.3.2. Power and Cabling; 2.3.3. Heating, Ventilation, and Air Conditioning; 2.3.4. Fire Detection and Quenching 327 $a2.3.5. Close Circuit Television and Burglar Alarms 2.3.6. Communications; 2.3.7. Water; 2.4. Physical security; 2.4.1. General; 2.4.2. Building Infrastructure; 2.4.3. Access Control; 2.4.4. On-Site Secure Evidence Storage; 2.4.5. Clean Room; 2.4.6. Fire Safes; 2.4.7. Secure Off-Site Storage; 2.5. Layout of the Forensic Laboratory; 2.5.1. Separation of Space for Specific Roles and Tasks; 2.5.2. Ergonomics; 2.5.3. Personal Workspace; 2.5.4. Size Estimating; 2.5.5. Infrastructure Rooms; Appendix 1 - Sample outline for a business case; Appendix 2 - Forensic Laboratory Physical Security Policy 327 $aIntroduction Purpose; Definitions; Scope; Audience; Policy statements; Responsibilities; Enforcement, monitoring, and breaches; Ownership; Review and maintenance; Approval; Chapter 3: Setting up the Forensic Laboratory; 3.1. Setting up the Forensic Laboratory; 3.1.1. Forensic Laboratory Terms of Reference; 3.1.2. The Status of the Forensic Laboratory; 3.1.3. The Forensic Laboratory Principles; 3.1.3.1. Responsibilities; 3.1.3.2. Integrity; 3.1.3.3. Quality; 3.1.3.4. Efficiency; 3.1.3.5. Productivity; 3.1.3.6. Meet Organizational Expectations; 3.1.3.7. Health and Safety 327 $a3.1.3.8. Information Security 3.1.3.9. Management Information Systems; 3.1.3.10. Qualifications; 3.1.3.11. Training; 3.1.3.12. Maintaining Employee Competency; 3.1.3.13. Employee Development; 3.1.3.14. Environment; 3.1.3.15. Supervision; 3.1.3.16. Conflicts of Interest; 3.1.3.17. Legal Compliance; 3.1.3.18. Accountability; 3.1.3.19. Disclosure and Discovery; 3.1.3.20. Work Quality; 3.1.3.21. Accreditation and Certification; 3.1.3.22. Membership of Appropriate Organizations; 3.1.3.23. Obtain Appropriate Personal Certifications; 3.1.4. Laboratory Service Level Agreements 327 $a3.1.5. Impartiality and Independence 330 $aThis is the first digital forensics book that covers the complete life cycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. A step-by-step guide to designing, building a 606 $aComputer crimes$xInvestigation 606 $aEvidence preservation$xStandards 606 $aForensic sciences$xStandards 606 $aComputer science 608 $aElectronic books. 615 0$aComputer crimes$xInvestigation. 615 0$aEvidence preservation$xStandards. 615 0$aForensic sciences$xStandards. 615 0$aComputer science. 676 $a363.250285 700 $aWatson$b David$g(David Lilburn)$0879396 701 $aJones$b Andrew$0569681 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910452749303321 996 $aDigital forensics processing and procedures$91963649 997 $aUNINA