Avatar of ALNMOO
ALNMOOFlag for Saudi Arabia

asked on 

Enterprise Forensic Solution

Hi All,

I have been asked to build a forensics lab for a large telecommunications company. They want complete a solution that cover tools, process and documentation.
The lab should be capable to handle forensics, investigation cases related to IT systems & telecommunications systems.

Who is the leader in such business?  
Security

Avatar of undefined
Last Comment
ALNMOO
SOLUTION
Avatar of Scorelli
Scorelli

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of Rich Rumble
Rich Rumble
Flag of United States of America image

The above is very good, and you can outsource to ontrack and other companies as well as get consultation. There are a number of books on the subject that can help you do it yourself:
http://www.cert.org/csirts/Creating-A-CSIRT.html
http://www.first.org/
http://www.amazon.com/Incident-Response-Computer-Forensics-Second/dp/007222696X/ref=sr_1_1?ie=UTF8&s=books&qid=1216986054&sr=1-1
-rich
Avatar of ALNMOO
ALNMOO
Flag of Saudi Arabia image

ASKER

Thanks for all,

All are great, but what i am looking for is a complete solution that covers investigations steps from A-Z and even non professional can use it.
Avatar of Rich Rumble
Rich Rumble
Flag of United States of America image

Let me know when you find it! That would never hold up in court... we asked this guy off the street to follow this document and these procedures ;)
   Security is a process, not a product. It's an endless, arduous, thankless process.
      -Bruce Schneier
That's even more true for forensics, you must track all data handling make copies, document findings etc... this is a good list/guide on computer data forensics:
http://en.wikipedia.org/wiki/Computer_forensics

You can't just have a good tool or two... But good tools are available as a start from OnTrack.
-rich
Avatar of ALNMOO
ALNMOO
Flag of Saudi Arabia image

ASKER

So, the most important is professionals and processes and after that tools come.

Is there any guide lines, best practices or standards on how can I build such section?
ASKER CERTIFIED SOLUTION
Avatar of Rich Rumble
Rich Rumble
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Avatar of ALNMOO
ALNMOO
Flag of Saudi Arabia image

ASKER

Thanks both guys
Security
Security

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.

32K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo