Forensic Investigative Process for Situational Awareness in Information Security

Forensic Investigative Process for Situational Awareness in Information Security

Khidir Mohamed Ali, Thomas Owens
ISBN13: 9781466601048|ISBN10: 1466601043|EISBN13: 9781466601055
DOI: 10.4018/978-1-4666-0104-8.ch019
Cite Chapter Cite Chapter

MLA

Ali, Khidir Mohamed, and Thomas Owens. "Forensic Investigative Process for Situational Awareness in Information Security." Situational Awareness in Computer Network Defense: Principles, Methods and Applications, edited by Cyril Onwubiko and Thomas Owens, IGI Global, 2012, pp. 344-356. https://doi.org/10.4018/978-1-4666-0104-8.ch019

APA

Ali, K. M. & Owens, T. (2012). Forensic Investigative Process for Situational Awareness in Information Security. In C. Onwubiko & T. Owens (Eds.), Situational Awareness in Computer Network Defense: Principles, Methods and Applications (pp. 344-356). IGI Global. https://doi.org/10.4018/978-1-4666-0104-8.ch019

Chicago

Ali, Khidir Mohamed, and Thomas Owens. "Forensic Investigative Process for Situational Awareness in Information Security." In Situational Awareness in Computer Network Defense: Principles, Methods and Applications, edited by Cyril Onwubiko and Thomas Owens, 344-356. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0104-8.ch019

Export Reference

Mendeley
Favorite

Abstract

As a starting point for the development of a common visualization of the forensics process by the members of an investigating team, this chapter provides algorithms that provide guidance and step by step instructions on how to deal with computer forensics and the investigations they carry out. A general introductory overview of computer forensics is provided, and the framework of a forensic investigation is summarized. On the basis of this framework, three algorithms are provided, one for each phase of a forensic investigation, which cover the different aspects of computer forensics and address key elements to be considered when attacked systems are investigated.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.