The New Zealand Hacker Case: A Post Mortem
A typical incident response pits technicians against networks that aren't prepared forensically. [1, 2] If practitioners do consider collecting network forensic data, they face a choice between expending extraordinary effort (time and money) collecting forensically sound data, or simply restoring the network as quickly as possible. In this context, the concept of organizational network forensic readiness has emerged. The following is a discussion of selected computer crime cases, using publically available information, spanning a period of time of several years, that together demonstrate the need for a preventive and proactive response to malicious intrusion over a reactive one. It concludes with recommendations for how to "operationalize" organizational network forensic readiness.
- Research Organization:
- Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
- Sponsoring Organization:
- USDOE
- DOE Contract Number:
- AC05-76RL01830
- OSTI ID:
- 992025
- Report Number(s):
- PNNL-SA-46503; TRN: US201021%%465
- Resource Relation:
- Conference: Oxford Internet Institute (OII) Cybersecurity Conference Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities
- Country of Publication:
- United States
- Language:
- English
Similar Records
Microbial Forensics: A Scientific Assessment
FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS