Академический Документы
Профессиональный Документы
Культура Документы
DIGITALFORENSIC???
VS
INTERNAL AUDITING???
A cyber forensic investigator will use Internal auditing furnishes them with
specific tools in an effort to gather analyses, appraisals,
specific data from an information recommendations, counsel and
system which may be a single information concerning the activities
computer, a network of computers or reviewed. The audit objective includes
any device capable of storing and promoting effective control at
transmitting electronic data , in such a reasonable cost
manner as to not alter, those data
identified on a system under
investigation UITM MELAKA, KAMPUS JASIN
ITT 593 : INTRODUCTION TO
7
DIGITAL FORENSICs
PURPOSE
The general incident response questionnaire were created to
help those responding to an incident protect mission-critical
systems and assets from internal and cyber threats. The specific
questionnaires provide guidelines for five specific types of
incidents , including :
Intrusions
Denial-of-service attacks
Malicious code
Malicious communication
Misuse of resources
Each type of incident is broken down into six steps that need to
be executed . These steps include :
• Pre-incident
• Immediate action
• Secondary action
• Evidence collection
• Corrective measures UITM MELAKA, KAMPUS JASIN
• Evaluation
ITT 593 : INTRODUCTION TO
DIGITAL FORENSICs
14