Computer Forensics in the Global Enterprise
نویسندگان
چکیده
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow a corporation to self-regulate and investigate their infrastructure with a significantly increased level of assurance; identifying the root cause of an incident and verifying the integrity of critical information. Many countries have enacted laws that call for corporations to implement extensive incident response policies and forensic capabilities. These laws are designed to protect both customers and ultimately, corporations. Government regulatory bodies are frequently requesting discovery from corporations in relation to certain investigations or allegations. Corporations are held responsible for conducting forensic-level investigations on their own. If a corporation does not have the adequate resources to perform such an investigation, these regulatory bodies may assign a third-party to conduct the discovery, significantly disrupting business processes and giving the corporation no control over the direction of the inquiry. With round-the-clock access of multi-national business environments, and real-time, anywhere response capabilities, network-enabled computer forensics provides the missing link in the security arsenal of today’s corporations.
منابع مشابه
Architectural Innovations for Enterprise Forensics
Trusted Computing initiatives such as the Trusted Computing Group (TCG) specifications and Microsoft's Next Generation Secure Computing Base (NGSCB) and Trusted Multi-Net are directed towards improvements in the security of user data, attestation of a trust level of a user and/or hardware device, and authentication of a user and/or hardware device. The Trusted Computing concept can be extended ...
متن کاملPolicies to Enhance Computer and Network Forensics
– The Internet is growing explosively, as is the number of crimes committed against or using computers. As a response to the growth of computer crime, the field of Computer and Network Forensics emerged. Computer forensics is the art of discovering and retrieving information about a crime in such a way to make it admissible in court. It is after-the-fact in that the only preventative capability...
متن کاملA survey of contemporary enterprise storage technologies from a digital forensics perspective
As the proliferation of digital computational systems continue to expand, increasingly complex technologies emerge, including those regarding large, enterprise-wide, information storage and retrieval systems. Within this study, we examine four contemporary enterprise storage technologies. Our examination of these technologies is presented with an overview of the technological features of each o...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملA Reference Architecture for Automation of Inter-Organizational Process-Oriented Collaboration
In today’s competitive, dynamic, and changing business environment, being able to collaborate globally within and beyond the enterprise borders is critical. Inter-Organizational Collaborations (IOCs) have been proposed as a response to the characteristics of highly competitive global business environments. So far, a number of reference models, frameworks, and ad hoc architectures related to som...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003