Computer Forensics: Securing permission to search

<<

d1spat3r

User avatar

Newbie
Newbie

Posts: 28

Joined: Mon Dec 04, 2006 10:13 am

Location: Wisconsin

Post Thu Apr 12, 2007 9:40 am

Computer Forensics: Securing permission to search

Short article at techrepublic on securing permission to search.

Computer forensics is a scientific approach to collecting, processing, preserving, and presenting electronic evidence. Failure to follow standard practices can make some or all evidence collected inadmissible in court. In this series of posts, I'll look at how to properly collect, process, and preserve evidence from both electronic and traditional sources. The discussion will be restricted to search and seizure practices in an office environment.


http://blogs.techrepublic.com.com/security/?p=209
CISSP, GSEC, GCFA
<<

estriches

Newbie
Newbie

Posts: 29

Joined: Mon Apr 16, 2007 1:56 pm

Post Mon Apr 16, 2007 4:49 pm

Re: Computer Forensics: Securing permission to search

the first thing that i might suggest is seeing how big brother does it.
http://www.cert.org/tech_tips/FBI_inves ... crime.html
you have to make sure all your paper work is signed, sealed and notarized (CYA is always good) before even thinking of looking at the clients pc/network. if this post is out of place, take it off i thought i would add my two cents. and of course the osstmm is always a good read for getting the basic paper work.

Play Hard Play Loyal
C|EH, C++ programmer

Return to Forensics

Who is online

Users browsing this forum: No registered users and 0 guests

cron
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software