How should you proceed if your network forensic investigation involves other companies?

What will be an ideal response?


ANSWER: As with all investigations, keep preservation of evidence in mind. Your investigation might turn up other companies that have been compromised. In much the same way you wouldn’t turn over proprietary company information to become public record, you shouldn’t reveal information discovered about other companies. In these situations, the best course of action is to contact the companies and enlist their aid in tracking down network intruders. Depending on the situation, at some point you might have to report the incident to federal authorities.

Computer Science & Information Technology

You might also like to view...

The first step in the incident response process is respond

Indicate whether the statement is true or false.

Computer Science & Information Technology

The terms directory and folder are used synonymously to refer to an entity that is used to organize files.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is the purpose of a State of Authority record?

A. It identifies the authoritative DNS server for the current zone. B. It identifies SSL certificates in use on the domain. C. It provides information about secondary DNS servers and off-site primary servers. D. It provides the authoritative alias for a computer name.

Computer Science & Information Technology

Critical Thinking Questions Case 3-1 ? Your friend Marvin works weekends in an electronics store selling computers. You are in the market for a new desktop for your home.  Why does Marvin recommend that you consider an all-in-one?

A. It may be less expensive than purchasing a tower and monitor separately. B. They usually come with a better warranty. C. Although they take up more space, they are more powerful. D. They typically are less susceptible to hacking and malware.

Computer Science & Information Technology