week 16

E2 Systematic forensic analysis of a suspect system

• Requirements for maintaining an accurate record, made at the time, or as soon after the

incident as possible.

• Retaining snapshots of the system.

• Requirements for the recording of all findings and considering how reliable the evidence is.

• Requirements for the recording of any alterations that have been intentionally and

unintentionally imposed by the investigator.

• Requirements for the creation of visual evidence of findings.

• Ensuring the evidence is relevant and not a false positive.

• Evaluation of the findings to determine whether or not they:

o provide evidence of a crime and/or an incident

o show that the system has been externally and/or internally compromised

o strongly support one possible cause more than other possible causes.

• Make recommendations to prevent security incidents from reoccurring in the future,

including improvement(s) to the:

o content of cyber security documentation (policies and/or agreements)

o adherence of cyber security documentation (policies and/or agreements)

o security protection measures (physical, software and/or hardware).


Last Updated
2018-08-29 14:29:19

Links to Learning Outcomes

Links to Assessment criteria

 


English


Maths







How 2's Coverage

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.

Files that support this week


| | | | |
Week 15
Prev
Week 16
Prev

Next
Webmaster Spelling Notifications