Computer Forensic P...
 
Notifications
Clear all

Computer Forensic Plainning-Checklists Guide

8 Posts
5 Users
0 Reactions
1,209 Views
(@computerforensics911)
Active Member
Joined: 18 years ago
Posts: 16
Topic starter  

This document appears to be very organized in it's approach to Computer Forensics Planning and Investigations.

See

http//www.giac.org/certified_professionals/practicals/gcfa/0283.php

From The Introduction/Forward Page Of The Document
This document does not discuss First Response roles and responsibilities. The document starts from the point where an incident has been verified and the determination has been made that a forensic investigation is needed.

A Forensic Plan is a combination of dynamic checklists and templates for recording computer investigation processing steps and information. The dynamic checklist aspect of the Forensic Plan originates from the precept that each investigation is unique. Since investigations have dynamic qualities, it would be inefficient to restructure current documentation each time new information was discovered. The document attempts to establish a standard template.

This document defines a single concept for illustrating the basic elements of a Forensic Plan from the first initial contact through submission of the final Forensic Report. As the investigation proceeds through the forensic processes, checklist items will be accomplished and the results of those actions will be recorded in the Forensic Plan.

Often critical decisions are made during the initial contact and Preliminary
Investigation Discussion (PID). This is where the scope and type of investigation are often decided. This document will assist the investigator in being prepared to discuss with management and properly estimate the resources required to complete the forensic investigation.

Jim


   
Quote
(@bithead)
Noble Member
Joined: 20 years ago
Posts: 1206
 

Acrobat says Document is broken?


   
ReplyQuote
(@computerforensics911)
Active Member
Joined: 18 years ago
Posts: 16
Topic starter  

BitHead

Just tried it and it works for me. If you send me your e-mail address, I will e-mail to you. Send to cybercops911@comcast.net

Jim


   
ReplyQuote
(@bithead)
Noble Member
Joined: 20 years ago
Posts: 1206
 

Thanks. Sent you my addy, but I did find the problem. GIAC web site does not play well with Mozilla on Mac (works fine in IE on PC).


   
ReplyQuote
Jamie
(@jamie)
Moderator
Joined: 5 years ago
Posts: 1288
 

This document appears to be very organized in it's approach to Computer Forensics Planning and Investigations

Absolutely, well worth reading.


   
ReplyQuote
(@myglas)
New Member
Joined: 12 years ago
Posts: 2
 

I can't seem to get to this document. Can you email this to me? myglas@gmail.com


   
ReplyQuote
jaclaz
(@jaclaz)
Illustrious Member
Joined: 18 years ago
Posts: 5133
 

I can't seem to get to this document. Can you email this to me?

You shouldn't post your e-mail address on a public forum, as it will soon be object of SPAM. 😯

Try here wink
http//digital-forensics.sans.org/community/papers/gcfa/safe-home_283

jaclaz


   
ReplyQuote
(@myglas)
New Member
Joined: 12 years ago
Posts: 2
 

Yeah I know but I get spam on that email all the time and its not my personal email so we good! Thank you for your help!


   
ReplyQuote
Share: