Cargando…

Digital forensics processing and procedures : meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements /

This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital for...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Watson, David (David Lilburn)
Otros Autores: Jones, Andrew
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam ; Boston : Syngress, 2013.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 EBOOKCENTRAL_ocn857712561
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|||||||||
008 130906s2013 ne ob 001 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d OCLCQ  |d OPELS  |d E7B  |d OCLCQ  |d UIU  |d OCLCQ  |d COO  |d OCLCQ  |d AZK  |d AGLDB  |d K6U  |d Z5A  |d PIFAG  |d FVL  |d LIV  |d OCLCQ  |d U3W  |d STF  |d OCLCF  |d D6H  |d TOF  |d OCLCQ  |d TKN  |d UKAHL  |d BRF  |d OCLCO  |d OCL  |d QGK  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 961574910  |a 1259256646 
020 |a 1299833144  |q (electronic bk.) 
020 |a 9781299833142  |q (electronic bk.) 
020 |a 9781597497459  |q (e-book) 
020 |a 1597497452  |q (e-book) 
020 |z 9781597497428 
020 |z 1597497428 
029 1 |a AU@  |b 000057230332 
029 1 |a CHNEW  |b 001011384 
029 1 |a DEBBG  |b BV042314346 
029 1 |a DEBSZ  |b 405350554 
029 1 |a NZ1  |b 15197938 
029 1 |a NZ1  |b 16034165 
035 |a (OCoLC)857712561  |z (OCoLC)961574910  |z (OCoLC)1259256646 
037 |a 514565  |b MIL 
050 4 |a HV8079.C65  |b W38 2013 
082 0 4 |a 363.250285  |2 23 
049 |a UAMI 
100 1 |a Watson, David  |q (David Lilburn)  |1 https://id.oclc.org/worldcat/entity/E39PCjtkpGQ9Xgkd9wWQWbd4v3 
245 1 0 |a Digital forensics processing and procedures :  |b meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements /  |c David Watson, Andrew Jones. 
260 |a Amsterdam ;  |a Boston :  |b Syngress,  |c 2013. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references and index. 
520 |a This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. A step-by-step guide to designing, building and using a digital forensics lab. A comprehensive guide for all roles in a digital forensics laboratoryBased on international standards and certifications. 
588 0 |a Print version record. 
505 0 0 |g Machine generated contents note:  |g 1.  |t Introduction --  |g 1.1.  |t Introduction --  |g Appendix 1  |t Some Types of Cases Involving Digital Forensics --  |g Appendix 2  |t Growth of Hard Disk Drives for Personal Computers --  |g Appendix 3  |t Disk Drive Size Nomenclature --  |g 2.  |t Forensic Laboratory Accommodation --  |g 2.1.  |t The Building --  |g 2.2.  |t Protecting Against External and Environmental Threats --  |g 2.3.  |t Utilities and Services --  |g 2.4.  |t Physical Security --  |g 2.5.  |t Layout of the Forensic Laboratory --  |g Appendix 1  |t Sample Outline for a Business Case --  |g Appendix 2  |t Forensic Laboratory Physical Security Policy --  |g 3.  |t Setting up the Forensic Laboratory --  |g 3.1.  |t Setting up the Forensic Laboratory --  |g Appendix 1  |t The Forensic Laboratory ToR --  |g Appendix 2  |t Cross Reference between ISO 9001 and ISO 17025 --  |g Appendix 3  |t Conflict of Interest Policy --  |g Appendix 4  |t Quality Policy --  |g 4.  |t The Forensic Laboratory Integrated Management System --  |g 4.1.  |t Introduction --  |g 4.2.  |t Benefits --  |g 4.3.  |t The Forensic Laboratory IMS --  |g 4.4.  |t The Forensic Laboratory Policies --  |g 4.5.  |t Planning --  |g 4.6.  |t Implementation and Operation --  |g 4.7.  |t Performance Assessment --  |g 4.8.  |t Continuous Improvement --  |g 4.9.  |t Management Reviews --  |g Appendix 1  |t Mapping ISO Guide 72 Requirements to PAS 99 --  |g Appendix 2  |t PAS 99 Glossary --  |g Appendix 3  |t PAS 99 Mapping to IMS Procedures --  |g Appendix 4  |t The Forensic Laboratory Goal Statement --  |g Appendix 5  |t The Forensic Laboratory Baseline Measures --  |g Appendix 6  |t Environment Policy --  |g Appendix 7  |t Health and Safety Policy --  |g Appendix 8  |t Undue Influene Policy --  |g Appendix 9  |t Business Continuity Policy --  |g Appendix 10  |t Information Security Policy --  |g Appendix 11  |t Access Control Policy --  |g Appendix 12  |t Change or Termination Policy --  |g Appendix 13  |t Clear Desk and Clear Screen Policy --  |g Appendix 14  |t Continuous Improvement Policy --  |g Appendix 15  |t Cryptographic Control Policy --  |g Appendix 16  |t Document Retention Policy --  |g Appendix 17  |t Financial Management Policy --  |g Appendix 18  |t Mobile Devices Policy --  |g Appendix 19  |t Network Service Policy --  |g Appendix 20  |t Personnel Screening Policy --  |g Appendix 21  |t Relationship Management Policy --  |g Appendix 22  |t Release Management Policy --  |g Appendix 23  |t Service Management Policy --  |g Appendix 24  |t Service Reporting Policy --  |g Appendix 25  |t Third-Party Access Control Policy --  |g Appendix 26  |t Acceptable use Policy --  |g Appendix 27  |t Audit Committee --  |g Appendix 28  |t Business Continuity Committee --  |g Appendix 29  |t Environment Committee --  |g Appendix 30  |t Health and Safety Committee --  |g Appendix 31  |t Information Security Committee --  |g Appendix 32  |t Quality Committee --  |g Appendix 33  |t Risk Committee --  |g Appendix 34  |t Service Delivery Committee --  |g Appendix 35  |t Whistle Blowing Policy --  |g Appendix 36  |t Management Review Agenda --  |g Appendix 37  |t Document Control Checklist --  |g Appendix 38  |t Document Metadata --  |g Appendix 39  |t File-Naming Standards --  |g Appendix 40  |t Watermarks in Use in the Forensic Laboratory --  |g Appendix 41  |t Document Review Form --  |g Appendix 42  |t IMS Calendar --  |g Appendix 43  |t Audit Plan Letter --  |g Appendix 44  |t Audit Reporting Form --  |g Appendix 45  |t CAR/PAR Form --  |g Appendix 46  |t Opening Meeting Agenda --  |g Appendix 47  |t Closing Meeting Agenda --  |g Appendix 48  |t Audit Report Template --  |g Appendix 49  |t Root Causes for Non-Conformity --  |g 5.  |t Risk Management --  |g 5.1.  |t A Short History of Risk Management --  |g 5.2.  |t An Information Security Risk Management Framework --  |g 5.3.  |t Framework Stage 1 -- ISMS Policy --  |g 5.4.  |t Framework Stage 2: Planning, Resourcing, and Communication --  |g 5.5.  |t Framework Stage 3: Information Security Risk Management Process --  |g 5.6.  |t Framework Stage 4: Implementation and Operational Procedures --  |g 5.7.  |t Framework Stage 5: Follow-up Procedures --  |g Appendix 1  |t Sample Communication Plan --  |g Appendix 2  |t Sample Information Security Plan --  |g Appendix 3  |t Asset Type Examples --  |g Appendix 4  |t Asset Values --  |g Appendix 5  |t Consequences Table --  |g Appendix 6  |t Some Common Business Risks --  |g Appendix 7  |t Some Common Project Risks --  |g Appendix 8  |t Security Threat Examples --  |g Appendix 9  |t Common Security Vulnerabilities --  |g Appendix 10  |t Risk Management Policy --  |g Appendix 11  |t The IMS and ISMS Scope Document --  |g Appendix 12  |t Criticality Ratings --  |g Appendix 13  |t Likelihood of Occurrence --  |g Appendix 14  |t Risk Appetite --  |g Appendix 15  |t Security Controls from CobIT and NIST 800-53 --  |g Appendix 16  |t Information Classification --  |g Appendix 17  |t The Corporate Risk Register --  |g Appendix 18  |t Comparison between Qualitative and Quantitative Methods --  |g Appendix 19  |t Mapping Control Functions to ISO 27001 --  |g Appendix 20  |t Mapping Security Concerns to ISO 27001 --  |g Appendix 21  |t SoA Template --  |g Appendix 22  |t The Forensic Laboratory's Security Metrics Report --  |g Appendix 23  |t Mapping ISO 31000 and ISO 27001 to IMS Procedures --  |g 6.  |t Quality in the Forensic Laboratory --  |g 6.1.  |t Quality and Good Laboratory Practice --  |g 6.2.  |t Management Requirements for Operating the Forensic Laboratory --  |g 6.3.  |t ISO 9001 for the Forensic Laboratory --  |g 6.4.  |t The Forensic Laboratory's QMS --  |g 6.5.  |t Responsibilities in the QMS --  |g 6.6.  |t Managing Sales --  |g 6.7.  |t Product and Service Realization --  |g 6.8.  |t Reviewing Deliverables --  |g 6.9.  |t Signing Off a Case --  |g 6.10.  |t Archiving a Case --  |g 6.11.  |t Maintaining Client Confidentiality --  |g 6.12.  |t Technical Requirements for the Forensic Laboratory --  |g 6.13.  |t Measurement, Analysis, and Improvement --  |g 6.14.  |t Managing Client Complaints --  |g Appendix 1  |t Mapping ISO 9001 to IMS Procedures --  |g Appendix 2  |t Mapping ISO 17025 to IMS Procedures --  |g Appendix 3  |t Mapping SWGDE Quality Requirements to IMS Procedures --  |g Appendix 4  |t Mapping NIST-150 Quality Requirements to IMS Procedures --  |g Appendix 5  |t Mapping ENFSI Quality Requirements to IMS Procedures --  |g Appendix 6  |t Mapping FSR Quality Requirements to IMS Procedures --  |g Appendix 7  |t Quality Manager, Job Description --  |g Appendix 8  |t Business Plan Template --  |g Appendix 9  |t Business KPIs --  |g Appendix 10  |t Quality Plan Contents --  |g Appendix 11  |t Induction Checklist Contents --  |g Appendix 12  |t Induction Feedback --  |g Appendix 13  |t Standard Proposal Template --  |g Appendix 14  |t Issues to Consider for Case Processing --  |g Appendix 15  |t Standard Quotation Contents --  |g Appendix 16  |t Standard Terms and Conditions --  |g Appendix 17  |t ERMS Client Areas --  |g Appendix 18  |t Cost Estimation Spreadsheet --  |g Appendix 19  |t Draft Review Form --  |g Appendix 20  |t Client Sign-Off and Feedback Form --  |g Appendix 21  |t Information Required for Registering a Complaint --  |g Appendix 22  |t Complaint Resolution Timescales --  |g Appendix 23  |t Complaint Metrics --  |g Appendix 24  |t Laboratory Manager, Job Description --  |g Appendix 25  |t Forensic Analyst, Job Description --  |g Appendix 26  |t Training Agenda --  |g Appendix 27  |t Some Individual Forensic Certifications --  |g Appendix 28  |t Minimum Equipment Records Required by ISO 17025 --  |g Appendix 29  |t Reference Case Tests --  |g Appendix 30  |t ISO 17025 Reporting Requirements --  |g Appendix 31  |t Standard Forensic Laboratory Report --  |g 7.  |t IT Infrastructure --  |g 7.1.  |t Hardware --  |g 7.2.  |t Software --  |g 7.3.  |t Infrastructure --  |g 7.4.  |t Process Management --  |g 7.5.  |t Hardware Management --  |g 7.6.  |t Software Management --  |g 7.7.  |t Network Management --  |g Appendix 1  |t Some Forensic Workstation Providers --  |g Appendix 2  |t Some Mobile Forensic Workstation Providers --  |g Appendix 3  |t Standard Build for a Forensic Workstation --  |g Appendix 4  |t Some Case Processing Tools --  |g Appendix 5  |t Policy for Securing IT Cabling --  |g Appendix 6  |t Policy for Siting and Protecting IT Equipment --  |g Appendix 7  |t ISO 20000-1 Mapping --  |g Appendix 8  |t Service Desk Manager, Job Description --  |g Appendix 9  |t Incident Manager, Job Description --  |g Appendix 10  |t Incident Status Levels --  |g Appendix 11  |t Incident Priority Levels --  |g Appendix 12  |t Service Desk Feedback Form --  |g Appendix 13  |t Problem Manager, Job Description --  |g Appendix 14  |t Contents of the Forensic Laboratory SIP --  |g Appendix 15  |t Change Categories --  |g Appendix 16  |t Change Manager, Job Description --  |g Appendix 17  |t Standard Requirements of a Request for Change --  |g Appendix 18  |t Emergency Change Policy --  |g Appendix 19  |t Release Management Policy --  |g Appendix 20  |t Release Manager, Job Description --  |g Appendix 21  |t Configuration Management Plan Contents --  |g Appendix 22  |t Configuration Management Policy --  |g Appendix 23  |t Configuration Manager, Job Description --  |g Appendix 24  |t Information Stored in the DSL and DHL --  |g Appendix 25  |t Capacity Manager, Job Description --  |g Appendix 26  |t Capacity Management Plan --  |g Appendix 27  |t Service Management Policy  
505 0 0 |t --  |g Appendix 28  |t Service Level Manager, Job Description --  |g Appendix 29  |t Service Reporting Policy --  |g Appendix 30  |t Policy for Maintaining and Servicing IT Equipment --  |g Appendix 31  |t ISO 17025 Tool Test Method Documentation --  |g Appendix 32  |t Standard Forensic Tool Tests --  |g Appendix 33  |t Forensic Tool Test Report Template --  |g Appendix 34  |t Overnight Backup Checklist --  |g 8.  |t Incident Response --  |g 8.1.  |t General --  |g 8.2.  |t Evidence --  |g 8.3.  |t Incident Response as a Process --  |g 8.4.  |t Initial Contact --  |g 8.5.  |t Types of First Response --  |g 8.6.  |t The Incident Scene --  |g 8.7.  |t Transportation to the Forensic Laboratory --  |g 8.8.  |t Crime Scene and Seizure Reports --  |g 8.9.  |t Postincident Review --  |g Appendix 1  |t Mapping ISO 17020 to IMS Procedures --  |g Appendix 2  |t First Response Briefing Agenda --  |g Appendix 3  |t Contents of the Grab Bag --  |g Appendix 4  |t New Case Form --  |g Appendix 5  |t First Responder Seizure Summary Log --  |g Appendix 6  |t Site Summary Form --  |g Appendix 7  |t Seizure Log --  |g Appendix 8  |t Evidence Locations in Devices and Media --  |g Appendix 9  |t Types of Evidence Typically Needed for a Case --  |g Appendix 10  |t The On/Off Rule. 
505 0 0 |g Note continued:  |g Appendix 11  |t Some Types of Metadata That may be Recoverable from Digital Images --  |g Appendix 12  |t Countries with Different Fixed Line Telephone Connections --  |g Appendix 13  |t Some Interview Questions --  |g Appendix 14  |t Evidence Labeling --  |g Appendix 15  |t Forensic Preview Forms --  |g Appendix 16  |t A Traveling Forensic Laboratory --  |g Appendix 17  |t Movement Sheet --  |g Appendix 18  |t Incident Response Report --  |g Appendix 19  |t Postincident Review Agenda --  |g Appendix 20  |t Incident Processing Checklist --  |g 9.  |t Case Processing --  |g 9.1.  |t Introduction to Case Processing --  |g 9.2.  |t Case Types --  |g 9.3.  |t Precase Processing --  |g 9.4.  |t Equipment Maintenance --  |g 9.5.  |t Management Processes --  |g 9.6.  |t Booking Exhibits in and out of the Secure Property Store --  |g 9.7.  |t Starting a New Case --  |g 9.8.  |t Preparing the Forensic Workstation --  |g 9.9.  |t Imaging --  |g 9.10.  |t Examination --  |g 9.11.  |t Dual Tool Verification --  |g 9.12.  |t Digital Time Stamping --  |g 9.13.  |t Production of an Internal Case Report --  |g 9.14.  |t Creating Exhibits --  |g 9.15.  |t Producing a Case Report for External Use --  |g 9.16.  |t Statements, Depositions, and Similar --  |g 9.17.  |t Forensic Software Tools --  |g 9.18.  |t Backing up and Archiving a Case --  |g 9.19.  |t Disclosure --  |g 9.20.  |t Disposal --  |g Appendix 1  |t Some International Forensic Good Practice --  |g Appendix 2  |t Some International and National Standards Relating to Digital Forensics --  |g Appendix 3  |t Hard Disk Log Details --  |g Appendix 4  |t Disk History Log --  |g Appendix 5  |t Tape Log Details --  |g Appendix 6  |t Tape History Log --  |g Appendix 7  |t Small Digital Media Log Details --  |g Appendix 8  |t Small Digital Media Device Log --  |g Appendix 9  |t Forensic Case Work Log --  |g Appendix 10  |t Case Processing KPIs --  |g Appendix 11  |t Contents of Sample Exhibit Rejection Letter --  |g Appendix 12  |t Sample Continuity Label Contents --  |g Appendix 13  |t Details of the Forensic Laboratory Property Log --  |g Appendix 14  |t Exhibit Acceptance Letter Template --  |g Appendix 15  |t Property Special Handling Log --  |g Appendix 16  |t Evidence Sought --  |g Appendix 17  |t Request for Forensic Examination --  |g Appendix 18  |t Client Virtual Case File Structure --  |g Appendix 19  |t Computer Details Log --  |g Appendix 20  |t Other Equipment Details Log --  |g Appendix 21  |t Hard Disk Details Log --  |g Appendix 22  |t Other Media Details Log --  |g Appendix 23  |t Cell Phone Details Log --  |g Appendix 24  |t Other Device Details Log --  |g Appendix 25  |t Some Evidence Found in Volatile Memory --  |g Appendix 26  |t Some File Metadata --  |g Appendix 27  |t Case Progress Checklist --  |g Appendix 28  |t Meeting the Requirements of HB 171 --  |g Appendix 29  |t Internal Case Report Template --  |g Appendix 30  |t Forensic Laboratory Exhibit Log --  |g Appendix 31  |t Report Production Checklist --  |g 10.  |t Case Management --  |g 10.1.  |t Overview --  |g 10.2.  |t Hard Copy Forms --  |g 10.3.  |t MARS --  |g 10.4.  |t Setting up a New Case --  |g 10.5.  |t Processing a Forensic Case --  |g 10.6.  |t Reports General --  |g 10.7.  |t Administrator's Reports --  |g 10.8.  |t User Reports --  |g Appendix 1  |t Setting up Organisational Details --  |g Appendix 2  |t Set up the Administrator --  |g Appendix 3  |t Audit Reports --  |g Appendix 4  |t Manage Users --  |g Appendix 5  |t Manage Manufacturers --  |g Appendix 6  |t Manage Suppliers --  |g Appendix 7  |t Manage Clients --  |g Appendix 8  |t Manage Investigators --  |g Appendix 9  |t Manage Disks --  |g Appendix 10  |t Manage Tapes --  |g Appendix 11  |t Manage Small Digital Media --  |g Appendix 12  |t Exhibit Details --  |g Appendix 13  |t Evidence Sought --  |g Appendix 14  |t Estimates --  |g Appendix 15  |t Accept or Reject Case --  |g Appendix 16  |t Movement Log --  |g Appendix 17  |t Examination Log --  |g Appendix 18  |t Computer Hardware Details --  |g Appendix 19  |t Non-Computer Exhibit Details --  |g Appendix 20  |t Hard Disk Details --  |g Appendix 21  |t Other Media Details --  |g Appendix 22  |t Work Record Details --  |g Appendix 23  |t Updating Case Estimates --  |g Appendix 24  |t Create Exhibit --  |g Appendix 25  |t Case Result --  |g Appendix 26  |t Case Backup --  |g Appendix 27  |t Billing and Feedback --  |g Appendix 28  |t Feedback Received --  |g Appendix 29  |t Organization Report --  |g Appendix 30  |t Users Report --  |g Appendix 31  |t Manufacturers Report --  |g Appendix 32  |t Supplier Report --  |g Appendix 33  |t Clients Report --  |g Appendix 34  |t Investigator's Report --  |g Appendix 35  |t Disks by Assignment Report --  |g Appendix 36  |t Disks by Reference Number Report --  |g Appendix 37  |t Wiped Disks Report --  |g Appendix 38  |t Disposed Disks Report --  |g Appendix 39  |t Disk History Report --  |g Appendix 40  |t Tapes by Assignment Report --  |g Appendix 41  |t Tapes by Reference Number Report --  |g Appendix 42  |t Wiped Tapes Report --  |g Appendix 43  |t Disposed Tapes Report --  |g Appendix 44  |t Tape History Report --  |g Appendix 45  |t Small Digital Media by Assignment Report --  |g Appendix 46  |t Small Digital Media by Reference Number Report --  |g Appendix 47  |t Wiped Small Digital Media Report --  |g Appendix 48  |t Disposed Small Digital Media Report --  |g Appendix 49  |t Small Digital Media History Report --  |g Appendix 50  |t Wipe Methods Report --  |g Appendix 51  |t Disposal Methods Report --  |g Appendix 52  |t Imaging Methods Report --  |g Appendix 53  |t Operating Systems Report --  |g Appendix 54  |t Media Types Report --  |g Appendix 55  |t Exhibit Type Report --  |g Appendix 56  |t Case Setup Details Report --  |g Appendix 57  |t Case Movement Report --  |g Appendix 58  |t Case Computers Report --  |g Appendix 59  |t Case Non-Computer Evidence Report --  |g Appendix 60  |t Case Disks Received Report --  |g Appendix 61  |t Case Other Media Received --  |g Appendix 62  |t Case Exhibits Received Report --  |g Appendix 63  |t Case Work Record --  |g Appendix 64  |t Cases Rejected Report --  |g Appendix 65  |t Cases Accepted --  |g Appendix 66  |t Case Estimates Report --  |g Appendix 67  |t Cases by Forensic Analyst --  |g Appendix 68  |t Cases by Client Report --  |g Appendix 69  |t Cases by Investigator Report --  |g Appendix 70  |t Case Target Dates Report --  |g Appendix 71  |t Cases Within "x" Days of Target Date Report --  |g Appendix 72  |t Cases Past Target Date Report --  |g Appendix 73  |t Cases Unassigned Report --  |g Appendix 74  |t Case Exhibits Produced Report --  |g Appendix 75  |t Case Results Report --  |g Appendix 76  |t Case Backups Report --  |g Appendix 77  |t Billing Run Report --  |g Appendix 78  |t Feedback Letters --  |g Appendix 79  |t Feedback Forms Printout --  |g Appendix 80  |t Feedback Reporting Summary by Case --  |g Appendix 81  |t Feedback Reporting Summary by Forensic Analyst --  |g Appendix 82  |t Feedback Reporting Summary by Client --  |g Appendix 83  |t Complete Case Report --  |g Appendix 84  |t Processed Report --  |g Appendix 85  |t Insurance Report --  |g 11.  |t Evidence Presentation --  |g 11.1.  |t Overview --  |g 11.2.  |t Notes --  |g 11.3.  |t Evidence --  |g 11.4.  |t Types of Witness --  |g 11.5.  |t Reports --  |g 11.6.  |t Testimony in Court --  |g 11.7.  |t Why Cases Fail --  |g Appendix 1  |t Nations Ratifying the Budapest Convention --  |g Appendix 2  |t Criteria for Selection an Expert Witness --  |g Appendix 3  |t The Forensic Laboratory Code of Conduct for Expert Witnesses --  |g Appendix 4  |t Report Writing Checklist --  |g Appendix 5  |t Statement and Deposition Writing Checklist --  |g Appendix 6  |t Non-Verbal Communication to Avoid --  |g Appendix 7  |t Etiquette in Court --  |g Appendix 8  |t Testimony Feedback Form --  |g 12.  |t Secure Working Practices --  |g 12.1.  |t Introduction --  |g 12.2.  |t Principles of Information Security within the Forensic Laboratory --  |g 12.3.  |t Managing Information Security in the Forensic Laboratory --  |g 12.4.  |t Physical Security in the Forensic Laboratory --  |g 12.5.  |t Managing Service Delivery --  |g 12.6.  |t Managing System Access --  |g 12.7.  |t Managing Information on Public Systems --  |g 12.8.  |t Securely Managing IT Systems --  |g 12.9.  |t Information Processing Systems Development and Maintenance --  |g Appendix 1  |t The Forensic Laboratory SoA --  |g Appendix 2  |t Meeting the Requirements of GAISP --  |g Appendix 3  |t Software License Database Information Held --  |g Appendix 4  |t Information Security Manager, Job Description --  |g Appendix 5  |t Logon Banner --  |g Appendix 6  |t The Forensic Laboratory's Security Objectives --  |g Appendix 7  |t Asset Details to be Recorded in the Asset Register --  |g Appendix 8  |t Details Required for Removal of an Asset --  |g Appendix 9  |t Handling Classified Assets --  |g Appendix 10  |t Asset Disposal Form --  |g Appendix 11  |t Visitor Checklist --  |g Appendix 12  |t Rules of the Data Center --  |g Appendix 13  |t User Account Management Form Contents --  |g Appendix 14  |t Teleworking Request Form Contents --  |g 13.  |t Ensuring Continuity of Operations --  |g 13.1.  |t Business Justification for Ensuring Continuity of Operations --  |g 13.2.  |t Management Commitment --  |g 13.3.  |t Training and Competence --  |g 13.4.  |t Determining the Business Continuity Strategy --  |g 13.5.  |t Developing and Implementing a Business Continuity Management Response --  |g 13.6.  |t Exercising, Maintaining, and Reviewing Business Continuity  
505 0 0 |t Arrangements --  |g 13.7.  |t Maintaining and Improving the BCMS --  |g 13.8.  |t Embedding Business Continuity Forensic Laboratory Processes --  |g 13.9.  |t BCMS Documentation and Records -- General --  |g Appendix 1  |t Supplier Details Held --  |g Appendix 2  |t Headings for Financial and Security Questionnaire --  |g Appendix 3  |t Business Continuity Manager, Job Description --  |g Appendix 4  |t Contents of the Forensic Laboratory BIA Form --  |g Appendix 5  |t Proposed BCMS Development and Certification Timescales --  |g Appendix 6  |t Incident Scenarios --  |g Appendix 7  |t Strategy Options --  |g Appendix 8  |t Standard Forensic Laboratory BCP Contents --  |g Appendix 9  |t Table of Contents to the Appendix to a BCP --  |g Appendix 10  |t BCP Change List Contents --  |g Appendix 11  |t BCP Scenario Plan Contents --  |g Appendix 12  |t BCP Review Report Template Contents --  |g Appendix 13  |t Mapping IMS Procedures to ISO 22301 --  |g Appendix 14  |t Differences between ISO 22301 and BS 25999 --  |g 14.  |t Managing Business Relationships --  |g 14.1.  |t The Need for Third Parties --  |g 14.2.  |t Clients --  |g 14.3.  |t Third Parties Accessing the Forensic Laboratory. 
505 0 0 |g Note continued:  |g 14.4.  |t Managing Service Level Agreements --  |g 14.5.  |t Suppliers of Office and IT Products and Services --  |g 14.6.  |t Utility Service Providers --  |g 14.7.  |t Contracted Forensic Consultants and Expert Witnesses --  |g 14.8.  |t Outsourcing --  |g 14.9.  |t Use of Sub-Contractors --  |g 14.10.  |t Managing Complaints --  |g 14.11.  |t Reasons for Outsourcing Failure --  |g Appendix 1  |t Contents of a Service Plan --  |g Appendix 2  |t Risks to Consider with Third Parties --  |g Appendix 3  |t Contract Checklist for Information Security Issues --  |g Appendix 4  |t SLA Template for Products and Services for Clients --  |g Appendix 5  |t RFx Descriptions --  |g Appendix 6  |t The Forensic Laboratory RFx Template Checklist --  |g Appendix 7  |t RFx Timeline for Response, Evaluation, and Selection --  |g Appendix 8  |t Forensic Consultant's Personal Attributes --  |g Appendix 9  |t Some Tips for Selecting an Outsourcing Service Provider --  |g Appendix 10  |t Areas to Consider for Outsourcing Contracts --  |g 15.  |t Effective Records Management --  |g 15.1.  |t Introduction --  |g 15.2.  |t Legislative, Regulatory, and Other Requirements --  |g 15.3.  |t Record Characteristics --  |g 15.4.  |t A Records Management Policy --  |g 15.5.  |t Defining the Requirements for Records Management in the Forensic Laboratory --  |g 15.6.  |t Determining Forensic Laboratory Records to be Managed by the ERMS --  |g 15.7.  |t Using Metadata in the Forensic Laboratory --  |g 15.8.  |t Record Management Procedures --  |g 15.9.  |t Business Continuity --  |g Appendix 1  |t MoReq2 Functional Requirements --  |g Appendix 2  |t Mapping of ISO 15489 Part 1 to Forensic Laboratory Procedures --  |g Appendix 3  |t Types of Legislation and Regulation that will Affect Record Keeping --  |g Appendix 4  |t Forensic Laboratory Record Keeping Policy --  |g Appendix 5  |t Record Management System Objectives --  |g Appendix 6  |t Business Case Contents --  |g Appendix 7  |t Outline of the ERMS Project --  |g Appendix 8  |t Selection Criteria for an ERMS --  |g Appendix 9  |t Initial ERMS Feedback Questionnaire --  |g Appendix 10  |t Metadata Required in the ERMS --  |g Appendix 11  |t Sample E-mail Metadata --  |g Appendix 12  |t Forensic Case Records Stored in the ERMS --  |g Appendix 13  |t Dublin Core Metadata Elements --  |g Appendix 14  |t National Archives of Australia Metadata Standard --  |g Appendix 15  |t Responsibilities for Records Management in the Forensic Laboratory --  |g Appendix 16  |t Metadata for Records Stored Off-Site --  |g Appendix 17  |t Records Classification System --  |g Appendix 18  |t Disposition Authorization --  |g Appendix 19  |t Additional Requirements for Physical Record Recovery --  |g Appendix 20  |t Specialized Equipment Needed for Inspection and Recovery of Damaged Records --  |g 16.  |t Performance Assessment --  |g 16.1.  |t Overview --  |g 16.2.  |t Performance Assessment --  |g 17.  |t Health and Safety Procedures --  |g 17.1.  |t General --  |g 17.2.  |t Planning for OH & S --  |g 17.3.  |t Implementation and Operation of the OH & S Management System --  |g 17.4.  |t Checking Compliance with OH & S Requirements --  |g 17.5.  |t Improving the OH & S Management System --  |g Appendix 1  |t OH & S Policy Checklist --  |g Appendix 2  |t The Forensic Laboratory OH & S Policy --  |g Appendix 3  |t Health and Safety Manager Job Description --  |g Appendix 4  |t Some Examples of OH & S Drivers --  |g Appendix 5  |t The Forensic Laboratory OH & S Objectives --  |g Appendix 6  |t Sample Hazards in the Forensic Laboratory --  |g Appendix 7  |t Hazard Identification Form --  |g Appendix 8  |t Some Areas for Inspection for Hazards --  |g Appendix 9  |t Inputs to the Risk Assessment Process --  |g Appendix 10  |t OH & S Risk Rating --  |g Appendix 11  |t DSE Initial Workstation Self-Assessment Checklist --  |g Appendix 12  |t DSE Training Syllabus --  |g Appendix 13  |t DSE Assessors Checklist --  |g Appendix 14  |t Measurement of OH & S Success --  |g Appendix 15  |t Specific OH & S Incident Reporting Requirements --  |g Appendix 16  |t OH & S Investigation Checklist and Form Contents --  |g Appendix 17  |t OH & S Incident Review --  |g Appendix 18  |t OHSAS 18001 Mapping to IMS Procedures --  |g 18.  |t Human Resources --  |g 18.1.  |t Employee Development --  |g 18.2.  |t Development --  |g 18.3.  |t Termination --  |g Appendix 1  |t Training Feedback Form --  |g Appendix 2  |t Employee Security Screening Policy Checklist --  |g Appendix 3  |t Employment Application Form --  |g Appendix 4  |t Employment Application Form Notes --  |g Appendix 5  |t Some Documents that can Verify Identity --  |g Appendix 6  |t Document Authenticity Checklist --  |g Appendix 7  |t Verifying Addresses --  |g Appendix 8  |t Right to Work Checklist --  |g Appendix 9  |t Reference Authorization --  |g Appendix 10  |t Statutory Declaration --  |g Appendix 11  |t Employer Reference Form --  |g Appendix 12  |t Employer's Oral Reference Form --  |g Appendix 13  |t Confirmation of an Oral Reference Letter --  |g Appendix 14  |t Qualification Verification Checklist --  |g Appendix 15  |t Criminal Record Declaration Checklist --  |g Appendix 16  |t Personal Reference Form --  |g Appendix 17  |t Personal Oral Reference Form --  |g Appendix 18  |t Other Reference Form --  |g Appendix 19  |t Other Reference Form --  |g Appendix 20  |t Employee Security Screening File --  |g Appendix 21  |t Top Management Acceptance of Employment Risk --  |g Appendix 22  |t Third-Party Employee Security Screening Provider Checklist --  |g Appendix 23  |t Recruitment Agency Contract Checklist --  |g Appendix 24  |t Investigation Manager, Job Description --  |g Appendix 25  |t Forensic Laboratory System Administrator, Job Description --  |g Appendix 26  |t Employee, Job Description --  |g Appendix 27  |t Areas of Technical Competence --  |g Appendix 28  |t Some Professional Forensic and Security Organizations --  |g Appendix 29  |t Training Specification Template --  |g Appendix 30  |t Training Proposal Evaluation Checklist --  |g Appendix 31  |t Training Supplier Interview and Presentation Checklist --  |g Appendix 32  |t Training Reaction Level Questionnaire --  |g Appendix 33  |t The Forensic Laboratory Code of Ethics --  |g Appendix 34  |t Termination Checklist --  |g 19.  |t Accreditation and Certification for a Forensic Laboratory --  |g 19.1.  |t Accreditation and Certification --  |g 19.2.  |t Accreditation for a Forensic Laboratory --  |g 19.3.  |t Certification for a Forensic Laboratory --  |g Appendix 1  |t Typical Conditions of Accreditation --  |g Appendix 2  |t Contents of an Audit Response --  |g Appendix 3  |t Management System Assessment Non-Conformance Examples --  |g Appendix 4  |t Typical Closeout Periods --  |g 20.  |t Emerging Issues --  |g 20.1.  |t Introduction --  |g 20.2.  |t Specific Challenges. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer crimes  |x Investigation. 
650 0 |a Evidence preservation  |x Standards. 
650 0 |a Forensic sciences  |x Standards. 
650 0 |a Computer science. 
650 0 |a Electronic data processing. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 6 |a Preuve (Droit pénal)  |x Conservation  |x Normes. 
650 6 |a Criminalistique  |x Normes. 
650 6 |a Informatique. 
650 7 |a computer science.  |2 aat 
650 7 |a data processing.  |2 aat 
650 7 |a Electronic data processing  |2 fast 
650 7 |a Computer crimes  |x Investigation  |2 fast 
650 7 |a Computer science  |2 fast 
700 1 |a Jones, Andrew. 
776 0 8 |i Print version:  |z 9781597497428 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1115161  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25553690 
938 |a ebrary  |b EBRY  |n ebr10755369 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis26099257 
994 |a 92  |b IZTAP