KEMBAR78
Module 05 First Responder Procedures | PDF
0% found this document useful (0 votes)
180 views82 pages

Module 05 First Responder Procedures

EC-Council CHFI Computer Hacking Forensic Investigator Training v8 Module 05 First Responder Procedures

Uploaded by

GhostDead
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF or read online on Scribd
0% found this document useful (0 votes)
180 views82 pages

Module 05 First Responder Procedures

EC-Council CHFI Computer Hacking Forensic Investigator Training v8 Module 05 First Responder Procedures

Uploaded by

GhostDead
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF or read online on Scribd
You are on page 1/ 82
Module 05 Designed by . Presented by Professionals. re Scenario Sam, a system administrator, was surprised to see critical files missing from his, y office server. He suspected that the server was compromised. He did not want to take a chance by investigating the system himself. Sam reported the incident to Bob, an Information Security Officer employed with the same firm. Bob took note of the request from Sam. Being a CHF, seizing Sam's system and following the basic procedures in investigating the case was easy for Bob. He investigated the image file of the hard disk of the server. His investigation revealed the presence of roctkit in one of the directories of the server. During the investigation process, Sam recalled downloading a patch management tool from the Internet from a third party source. He realized that kit could have been bundled with the patch management tool @:e CU eel aaa Eee ae red Security News EESlSSfaa55 PT Tey, 2, 2014 Astechnology evolves, so does the criminal mind. To be successful in this information age, law enforcement ABOUT US must embrace technology tocombat 21st century crimes, That is the philosophy of Franklin County Sherif Ewell Hunt. " " Hunt said, “investigations as today are very different than they were 30 years ago, so we must adapt our methods to the 2ist century criminal.” . "For example, Hunt PRESENTATION said. "Anc they contain a wealth of information we can use to establish time lines, contacts and addresses that are useful to our investigations.” PARTNERS CONTACT 3 | BE aD E "We do not monitor cell phone use," said Sgt. Eric Ingram. "We retrieve information from call phones we have obtained legally during criminal investigations.” eeps/pmaru tnefankinnewspost.com Credence ee as

You might also like