Specifying digital forensics: A forensics policy approach

Digital Investigation - Tập 4 - Trang 101-104 - 2007
Carol Taylor1, Barbara Endicott-Popovsky2, Deborah A. Frincke3
1University of Idaho, Computer Science Department, Moscow, ID 83844, United States
2Center of Information Assurance and Cybersecurity, Box 354985, University of Washington, Seattle, WA 98105, United States
3Pacific Northwest National Laboratory, Richland, WA 99352, United States

Tài liệu tham khảo

Bishop, 2004 Carrier, 2003, Getting physical with the digital investigation process, Int J Digit Evid, 2 Clark DD, Wilson DR. A comparison of commercial and military computer security policies. In: Proceedings of the IEEE symposium on security and privacy, 1987. p. 184–919. Endicott-Popovsky, 2006, Embedding forensic capabilities into networks: addressing inefficiencies in digital forensics investigations Meadaris, 2006 Rowlinson, 2004, Ten steps to forensic readiness, Int J Digit Evid, 2 Tan, 2001 Wolfe-Wilson, 2003, Management strategies for implementing forensic security measure, Inform Secur Tech Rep, 8, 55, 10.1016/S1363-4127(03)00207-3 Yasinsac, 2001, Policies to enhance computer and network forensics