How the Certified Information Systems Security Professional certification supports Digital Forensic processes

نویسندگان

  • Samantha Rule
  • Adrie Stander
  • Jacques Ophoff
چکیده

This paper explores whether a relationship exists between the Certified Information Systems Security Professional (CISSP) certification and digital forensics. The key findings show that the CISSP Common Body of Knowledge (CBK) covers a wide spectrum of information security practices, processes, and procedures and that the CISSP certification can provide a basic introduction to digital forensic processes and concepts from an incident response perspective. However, the CISSP certification does not bestow an in depth knowledge of digital forensic processes upon those who attain this certification. The CISSP CBK therefore does not support digital forensic processes beyond providing a basic understanding of what digital forensics is and the general concepts found within the digital forensic realm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Forensic Computing Training, Certification and Accreditation: An Australian Overview

Training, certification and accreditation are concepts that are used in almost all aspects of professional life. This paper reviews current initiatives in Forensic Computing training and certification in Australia and the effect of this on National Accreditation processes.

متن کامل

A Comprehensive Cyber Compliance Model for Tactical Systems

Mark S. Edwards, CISSP/MSEE/MCSE Problem Statement: For Army Program of Record (POR) tactical systems, achieving timely interoperability certification is impacted due to the lack of a funded, comprehensive cyber compliance program. Adding to this challenge is the need to comply with increasing and evolving cyber security requirements that must also extend beyond the test arena. To realize the A...

متن کامل

Common Criteria certified open source software - fact or fiction?

In 2012 the two open source projects CESeCore and EJBCA were Common Criteria certified [CCP], using open source tools and open source methodologies. As the actual software and its long term evolution is perhaps the most important result for most users, we will look at how certification, distribution and maintenance is managed. Can they be done in an open source way, and is certification always ...

متن کامل

Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...

متن کامل

Forensic Investigation in Communication Networks Using Incomplete Digital Evidences

Security incidents targeting information systems have become more complex and sophisticated, and intruders might evade responsibility due to the lack of evidence to convict them. In this paper, we develop a system for Digital Forensic in Networking, called DigForNet, which is useful to analyze security incidents and explain the steps taken by the attackers. DigForNet combines intrusion response...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012