How the Certified Information Systems Security Professional certification supports Digital Forensic processes
نویسندگان
چکیده
This paper explores whether a relationship exists between the Certified Information Systems Security Professional (CISSP) certification and digital forensics. The key findings show that the CISSP Common Body of Knowledge (CBK) covers a wide spectrum of information security practices, processes, and procedures and that the CISSP certification can provide a basic introduction to digital forensic processes and concepts from an incident response perspective. However, the CISSP certification does not bestow an in depth knowledge of digital forensic processes upon those who attain this certification. The CISSP CBK therefore does not support digital forensic processes beyond providing a basic understanding of what digital forensics is and the general concepts found within the digital forensic realm.
منابع مشابه
Forensic Computing Training, Certification and Accreditation: An Australian Overview
Training, certification and accreditation are concepts that are used in almost all aspects of professional life. This paper reviews current initiatives in Forensic Computing training and certification in Australia and the effect of this on National Accreditation processes.
متن کاملA Comprehensive Cyber Compliance Model for Tactical Systems
Mark S. Edwards, CISSP/MSEE/MCSE Problem Statement: For Army Program of Record (POR) tactical systems, achieving timely interoperability certification is impacted due to the lack of a funded, comprehensive cyber compliance program. Adding to this challenge is the need to comply with increasing and evolving cyber security requirements that must also extend beyond the test arena. To realize the A...
متن کاملCommon Criteria certified open source software - fact or fiction?
In 2012 the two open source projects CESeCore and EJBCA were Common Criteria certified [CCP], using open source tools and open source methodologies. As the actual software and its long term evolution is perhaps the most important result for most users, we will look at how certification, distribution and maintenance is managed. Can they be done in an open source way, and is certification always ...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملForensic Investigation in Communication Networks Using Incomplete Digital Evidences
Security incidents targeting information systems have become more complex and sophisticated, and intruders might evade responsibility due to the lack of evidence to convict them. In this paper, we develop a system for Digital Forensic in Networking, called DigForNet, which is useful to analyze security incidents and explain the steps taken by the attackers. DigForNet combines intrusion response...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012