Page 679 - StudyBook.pdf
P. 679

Operational and Organizational Security: Incident Response • Chapter 11  663


                 A: A person conducting computer forensic investigations and examinations should
                    have expert computer skills, including an understanding of hardware, network
                    technologies, programming skills, and forensic procedures. It is also a good idea
                    for the forensics investigator to have a good knowledge of applicable local, state,
                    and federal laws regarding computer crimes and rules of evidence.

                 Q: How should I prepare evidence to be transported in a forensic investigation?

                 A: Before transporting evidence, you should ensure that it is protected from being
                    damaged. Hard disks and other components should be packed in anti-static
                    bags, and other components should be packaged to reduce the risk of damage
                    from being jostled.All evidence should be sealed in a bag and/or tagged to
                    identify it as a particular piece of evidence, and information about the evidence
                    should be included in an evidence log.

                 Q: I want to fix vulnerabilities by installing the latest bug fixes and service packs
                    on my servers, but I’m concerned about issues where the service pack or bug
                    fix causes more harm than what it is repairing. How can I minimize the risk of
                    problems associated with installing service packs and bug fixes?
                 A: A number of cases have occurred where problems arise after a bug fix or ser-
                    vice pack has been installed.To minimize the risk of this occurring, wait a short
                    period of time after it is initially released to determine what problems (if any)
                    can be expected from installing the fix or service pack. Even after others have
                    tried it successfully, you should not install major system updates on your critical
                    systems without first testing them on a prototype system that is not connected
                    to the production network.

























                                                                              www.syngress.com
   674   675   676   677   678   679   680   681   682   683   684