From the course: Cloud Security Operations by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Ediscovery and forensics
From the course: Cloud Security Operations by Pearson
Ediscovery and forensics
Let's look at the e-discovery process. In phase one, we have identification. Electronically stored information, otherwise known as ESI, that is feasibly important to a case is recognized, along with locations, custodians, sizes, volumes, and more. Then we have preservation. The identified, potentially relevant ESI, or electronically stored information, is placed under legal hold many times, starting the official forensic process. You have to ensure beyond a doubt that the information is secure. Third is collection. The ESI is pulled together from the original custodian or controller, frequently by physically moving the original digital storage media to a safe chain of custody, and of course using write-blocking technology, for example, FTK Imager. Phase 4 is Processing. Forensic bit copies are stored for search or analysis for information relevant to the case, using appropriate forensic techniques and toolkits, for example, NCASE by Guidance Software. Then we have the review phase…
Contents
-
-
-
-
-
(Locked)
Conflicting international legislation8m 27s
-
(Locked)
Ediscovery and forensics3m 56s
-
(Locked)
Issues with PHI and PII in the cloud2m 45s
-
(Locked)
Standard privacy requirements2m 25s
-
(Locked)
Privacy impact assessments (PIAs)2m 38s
-
(Locked)
Risk treatment3m 47s
-
(Locked)
Provider risk assessment programs3m 13s
-
(Locked)
Regulatory transparency requirements3m 11s
-
(Locked)
-
-