Download Implementing Digital Forensic Readiness: From Reactive to Proactive Process 2nd Edition Jason Sachowski ebook All Chapters PDF
Download Implementing Digital Forensic Readiness: From Reactive to Proactive Process 2nd Edition Jason Sachowski ebook All Chapters PDF
com
https://textbookfull.com/product/implementing-digital-
forensic-readiness-from-reactive-to-proactive-process-2nd-
edition-jason-sachowski/
OR CLICK BUTTON
DOWNLOAD NOW
https://textbookfull.com/product/veterinary-forensic-pathology-2-1st-
edition-jason-w-brooks/
textboxfull.com
https://textbookfull.com/product/forensic-uses-of-digital-imaging-
second-edition-russ/
textboxfull.com
https://textbookfull.com/product/nato-and-the-western-balkans-from-
neutral-spectator-to-proactive-peacemaker-1st-edition-niall-
mulchinock-auth/
textboxfull.com
Forensic Data Collections 2.0: A Selection of Trusted
Digital Forensics Content 2nd Edition Robert B. Fried
https://textbookfull.com/product/forensic-data-
collections-2-0-a-selection-of-trusted-digital-forensics-content-2nd-
edition-robert-b-fried/
textboxfull.com
https://textbookfull.com/product/digital-forensic-art-techniques-a-
professionals-guide-to-corel-painter-first-edition-natalie-murry/
textboxfull.com
https://textbookfull.com/product/cybersecurity-readiness-first-
edition-dave-chatterjee/
textboxfull.com
https://textbookfull.com/product/feedstock-technology-for-reactive-
metal-injection-molding-process-design-and-application-1st-edition-
peng-cao/
textboxfull.com
Implementing Digital
Forensic Readiness
Implementing Digital
Forensic Readiness
From Reactive to Proactive Process
Second Edition
Jason Sachowski
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize
to copyright holders if permission to publish in this form has not been obtained. If any copyright material
has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, trans-
mitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com
(http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Dan-
vers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a
variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of
payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
Preface xvii
Acknowledgments xviii
Introduction xix
Author xxi
Section I
ENABLING DIGITAL FORENSICS
v
vi Contents
Section II
ENHANCING DIGITAL FORENSICS
Benefits Analysis 83
Implementing Forensics Readiness 85
Summary 86
Intermediate 190
Advanced 191
Digital Forensics Experts 192
Summary 194
Section III
INTEGRATING DIGITAL FORENSICS
18 Forensics Readiness in Cloud Environments 218
Introduction 218
Brief History of Cloud Computing 218
What Is Cloud Computing? 219
Characteristics 220
Service Models 221
Delivery Models 221
Isolation Models 222
Challenges with Cloud Environments 223
Mobility 223
Hyper-Scaling 223
Containerization 224
First Responders 224
Evidence Gathering and Processing 224
Forensics Readiness Methodology 225
Step #1: Define Business Risk Scenarios 225
Step #2: Identify Potential Data Sources 226
Step #3: Determine Collection Requirements 227
Enterprise Management Strategies 228
Cloud Computing Governance 228
Security and Configuration Standards 229
Reference Architectures 229
Step #4: Establish Legal Admissibility 232
Layers of Trust 232
Step #5: Establish Secure Storage and Handling 234
Step #6: Enable Targeted Monitoring 235
Step #7: Map Investigative Workflows 236
Phase #1: Preparation 236
Phase #2: Gathering 237
Phase #3: Processing 238
Phase #4: Presentation 238
Step #8: Establish Continuing Education 238
General Awareness 239
Basic Training 239
Formal Education 239
Step #9: Maintain Evidence-Based Presentations 240
Step #10: Ensure Legal Review 240
Contractual Agreements 241
Summary 242
xiv Contents
Section IV
ADDENDUMS
Section V
APPENDIXES
Section VI
TEMPLATES
The art of war teaches us to rely not on the likelihood of the enemy’s not coming,
but on our own readiness to receive him; not on the chance of his not attack-
ing, but rather on the fact that we have made our position unassailable.
—Sun Tzu
The Art of War
xvii
Acknowledgments
I would like to most of all thank my wife and my children for showing me that
no matter what I do in my lifetime, they will always be my greatest success.
Thank you to my parents for providing me with countless opportuni-
ties to become who I am today and for encouraging me to keep pushing my
boundaries.
Thank you to my colleagues for allowing me the honor of working with
you and for the infinite wisdom and knowledge you have given me.
Lastly, thank you to Blair for opening doors.
xviii
Introduction
xix
xx Introduction
the people, process, and technology areas are used to defend the enterprise
through integrating digital forensics capabilities with key business functions.
The information contained in this book has been written to benefit peo-
ple who:
xxi
Enabling
Digital Forensics I
Understanding
Digital Forensics
1
Introduction
Prologue (1960s–1980s)
From the 1960s to 1980s, computers were owned and operated by corporations,
universities, research centers, and government agencies. Computers were used
primarily as industrial systems largely supporting data processing functions and
were, for the most part, not connected to the outside world. Responsibility for
securing these computer systems was left to administrators who would perform
routine audits to ensure the efficiency and accuracy of the data processing
functions. These activities were essentially the first systematic approach to a
computer security discipline.
It was during this time that the computer first became a point of
interest to the information security, legal, and law enforcement communities.
Several government agencies started creating small ad hoc groups of
individuals who were then provided with basic training on computer systems.
These “investigators” would work with administrators to gather information
from the computer systems to be used as evidence in criminal matters.
Prior to the 1980s, computer crimes were largely dealt with under existing
laws. However, in response to an increasing number of computer crimes,
law enforcement agencies began establishing new laws to address computer
crimes. The first computer crime law, the Florida Computer Crimes Act, was
created in 1978 to address fraud, intrusion, and all unauthorized access to
computer systems. The evolution of crime into computer systems during this
time led to new terms such as computer forensics, forensics computer analysis,
and forensics computing.
Infancy (1980–1995)
With the arrival of the IBM personal computer (PC), there was a sudden
explosion of computer hobbyists around the world. These PCs had very few
applications and were not user friendly, which enticed hobbyists to write
program code and access the internals of both the hardware and operating
system (OS) to better understand how they worked. Amongst the hobbyists
were individuals from law enforcement, government agencies, and other
organizations who collectively shared their understanding of computer
systems and how technology could play a larger role as a source of evidence.
Much of the time and money spent by these individuals to learn about these
modern technologies was done of their own accord because their respective
agencies did not necessarily support their efforts.
Investigations performed by these pioneers were rudimentary from
today’s perspective. The Internet was not yet widely available for consumer use,
which limited the scope of most investigations to data recovery on standalone
computer systems. Cyber criminals mostly consisted of a mix of traditional
criminals who used technology to support their activities (e.g., phreaking)
and people who used their technical skills to illegally access other computers.
During this time, there were very few tools available, which left
investigators to either build their own or use available data protection and
recovery applications to perform analysis. Additionally, the only means of
preserving evidence was taking logical backups of data onto magnetic tape,
hoping that the original attributes were preserved, and restoring the data to
another disk, where analysis was performed using command-line utilities.
Throughout the 1990s, forensics tools began to emerge from both the hob-
byists (e.g., Dan J. Mare’s Maresware, Gord Hama’s RCMP Utilities) and larger
software vendors (e.g., Norton’s Utilities, Mace Utilities). These applications and
software suites were developed to solve specific forensics activities (e.g., imaging,
file recovery) and proved to be powerful tools for the computer forensics practice.
As technology became more widely available and reports of different
types of computer crimes were becoming more widely known, law
enforcement agencies around the world started responding by enacting laws
similar to that passed by Florida. In 1983, Canada was the first to respond by
6 Understanding Digital Forensics
Childhood (1995–2005)
The next decade proved to be a major step forward in the maturity of digital
forensics. Technology quickly became pervasive amongst consumers, where
it was embedded in many facets of our daily lives, which drove significant
technology innovation (e.g., mobile devices). Plus, the Internet had gained
enough momentum for it to become more readily available for use in homes
and businesses, introducing personal accessibility to email and web browsing.
Accompanied by these advances in technology was the opportunity for
criminals to commit new cybercrimes. An example of this opportunity
being made available through technology occurred following the events on
September 11, 2001, when investigators realized that digital evidence of the
attack was recoverable on computers located across the world. This revelation
reinforced the fact that criminals were using technology in the same
ubiquitous ways as the everyday consumer.
From the technology-sponsored growth of digital crime, the term computer
forensics became increasing challenging to use because both crimes and evidence
could now be found throughout networks, printers, and other devices. In 2001,
the first annual Digital Forensics Research Workshop (DFRWS) recognized
that computer forensics was considered a specialization and proposed the use of
the term digital forensics to describe the discipline as a whole.
Expansion of the field into the all-encompassing digital forensics resulted
in the creation of specializations for investigating different technologies.
In addition to the traditional computer forensics becoming a concentration,
there was the introduction of network forensics and mobile forensics.
However, with the formation of these specializations came increased
technical sophistication and legal scrutiny over requirements to follow
standardized principles, methodologies, and techniques.
The formalization of digital forensics led to the first publication of
standardized principles being issued between 1999 and 2000 from the
Other documents randomly have
different content
The Project Gutenberg eBook of Martha
Schofield, pioneer Negro educator
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.
Language: English
By MATILDA A. EVANS, M. D.
Graduate Schofield School
Copyright, 1916.
By Matilda A. Evans, M. D.
Into the midst of these terrible times which made weak the souls
and hearts of the strongest of men, came Miss Martha Schofield, the
first of the pioneers to push into the distracted South to labor, to
suffer, and if need be, to die for the millions of ignorant, irresponsible
Negroes. Their education, along industrial lines, she made her life-
work—crowning it on the 77th day of her birth, February 1, 1916, by
passing from earth to heaven. But she left to show that she did
something on earth a school and campus comprising an area of two
entire blocks in the beautiful City of Aiken, S. C., on which she had
erected eight buildings.
The school farm, adequate for all farm demonstration work,
consists of about 400 acres. The funds by which all this valuable
property was acquired was raised by Miss Schofield herself, through
the fluent use of her trenchant pen, which she knew how to wield as
few women have ever learned to do. Everything contracted for in the
interest of the school was paid for in cash as Miss Schofield, in all
her fifty years of administration, never contracted the outlay of
money without first having provided the means with which to meet
claims. She enjoyed the good-will and friendship of men and women
of wealth and influence throughout the country, especially of the old
Abolitionists, who supported her institution generously as long as
they lived and possessed the means with which to do so.
The Schofield School at Aiken has sent out into the world many
young men and women who have gone back among their own
people accomplished teachers, ministers, physicians, farmers and
artisans, leading the colored race of the South to the highest
appreciation of what Martha Schofield’s motto for life was
—“Thoroughness,” thoroughness not only in books and the industrial
arts, but in thought and action as well. No doubt the success which
attended the efforts of the graduates of this School is due, in the
main, to the strict regard for efficiency with which this great woman
inspired every student coming under her influence.
When we contemplate the wide-spread influence which the life
and work of Martha Schofield has exerted on the education of the
people of the South, the white as well as the colored, words become
inadequate to pay proper tribute to her; to justly express the
appreciation felt by those having knowledge of her achievements.
There is not a colored school in the entire South that has not
acknowledged the wisdom of this Divinely endowed leader and
instructor by establishing an industrial department. Recognizing the
imperative importance of this sort of instruction almost all the schools
and colleges for whites emphasize it by giving it first place in their
curriculums. Clemson, for white men and Rock Hill Normal and
Industrial Institute for young white women were established long
after Miss Schofield brought home to the people of the South the
crying necessity of preparing our boys and girls of all races for the
actual duties met with in every day home life. The vision which she
herself had of a thorough preparation for the humbler tasks lighted
the intellectual skies of the whole South after years of success by
her in the education of the weaker race. This fact is made more
prominent by the action of many of the States in incorporating
industrial courses in the common schools.
Much credit must be given to the practical success of Miss
Schofield’s school work for the marvelous strides made by the
education of the Negro at such celebrated institutions as Hampton,
Va., with an enrollment annually of over 1,500 students and an
endowment of over $1,000,000.00; and at Tuskegee, with about an
equal number of students and as great or greater endowment fund.
Then there are other great institutions devoted entirely to the
education of the colored race, making quite a feature of the industrial
department, such as Atlanta University, Atlanta, Ga., Fisk University,
Nashville, Term., Haines Institute, Augusta, Ga., Spellman
University, Atlanta, Ga., Claflin and the Agricultural Colored State
College at Orangeburg, S. C. Also Benedict at Columbia and
Voorhees Institute at Denmark, all of which have grown into
existence and attained the top-most rung of the ladder of fame since
the coming to the South of Martha Schofield in 1865.
Near the Schofield School is the Bettis Academy in Edgefield
County, South Carolina, formed and modeled after the fashion of the
Aiken School. Alford Nicholson, the principal, is a product of the
latter and is working out with great similarity the ideas and theories
of his Alma Mater. The good being accomplished here in a small way
is one of the great triumphs of the life-work of Miss Schofield, it being
her greatest aim in life not to create and endow great institutions of
learning with money and high sounding names, but to plant in the
heart and soul of every child coming under her influence those
principles of efficiency that would enable them to get out into the
world and actually do something to lift up the fallen. She acted
always as if the taking of the name of the Lord in vain consisted
entirely of praying for the Kingdom of God to come but doing
absolutely nothing to bring those prayers to pass. “Deeds, deeds, my
children,” she was fond of saying, “are what count, not mere words.”
The absence of faith in God, she asserted, was seen in all those
who did not turn their hand to accomplish the results for which they
prayed. No one can successfully accuse her of hypocracy in the
least. She practiced what she taught and taught others that anything
less than that was hypocracy and infidelism.
Miss Martha Schofield was born near Newton, in Bucks County,
Pennsylvania, on the first day of February in the year 1839 of well-to-
do parents, who professed and lived true the principles of religion as
enunciated by the Society of Friends, or the Quakers, as they are
commonly called. This stern sect of religious puritans date their
arrival in America along with the earliest immigrants, and in
proportion to numbers can lay as heavy claim to being responsible
for the civilization of the present day as any other denomination
inhabiting the New World. The same cause, religious persecution,
leading other denominations to seek a home on American shores,
where they could worship God in their own way, inspired the Friends
to come to this country. William Penn, a very wealthy and highly
educated man, famous the civilized world over for his kindness of
heart and generous benevolences, was a member of the Society and
one of its chief supporters in England and America. He founded the
City of Philadelphia, which means brotherly love. The foundation
stone of the whole structure of the Quaker religion is carved out of
the rock of brotherly love, and it was this love that placed Ben Abon
Ahem on the highest seat in the house of the Hall of Saints when the
wandering Angel of the earth went to Heaven to pick out the
Archangel within the pearly gates.
The love which Martha Schofield bore for all mankind, white and
black, Jew and Greek, male and female, friend and foe, was
evidently inspired by a religious conviction that held her thrall.
Not since Christ has there been a man or woman of whom it can
be truly said he or she could not possibly, wilfully sin, but it is
believed confidently by all who knew Miss Schofield best that she
would not under any circumstances knowingly commit sin. It was as
natural for her to be virtuous and righteous as it is natural for the
vicious to be bad, unkind, selfish and immoral.
While Miss Schofield was kind and generous to prodigality she
was also as brave as a lion and quick as a tiger to fight if the
occasion demanded it. While she always took counsel and weighed
matters carefully she never failed to contend for what she believed to
be right. Her nature seemed blended with the holiness of a sacred
spirituality, imparted to it no doubt by her religious training, and an
invincibleness in matters affecting social relations that bordered the
stubbornness of Satan. Influenced, possibly, to greatness in the
latter attribute by the teachings of the Abolitionist Party, to which she
belonged in heart, mind and soul?
As one of her most valued friends and one of the most brilliant of
the many noteworthy people said of her at the funeral, the author
wishes to repeat here: “Martha Schofield is not dead; she lives and
will continue to live in the memory of her students scattered all over
South Carolina and other States. She lives in their memory and in
the memory of their children’s children, for there are few colored
homes in which her name and deeds are not recounted in the family
circle. I count some of her best work, the efforts she made to elevate
and purify the home. She spent much time and endured many
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com