From the course: Cybersecurity Foundations: Computer Forensics
Unlock the full course today
Join today to access over 25,200 courses taught by industry experts.
Compliance and forensics
From the course: Cybersecurity Foundations: Computer Forensics
Compliance and forensics
- [Narrator] Computer forensics is essential to meeting compliance requirements. Organizations must comply with different rules and regulations, depending on the industry. The Health Insurance Portability and Accountability Act, or HIPAA of 1996, stipulates protecting personally identifiable information, or PII, in the healthcare and insurance industries. The National Institute of Standards and Technology, or NIST, is a non-regulatory agency of the US Department of Commerce. NIST SP 800-66 is a publication designed to help implement the HIPAA security rule. SP here stands for special publication. The NIST Guide clearly specifies computer forensics requirements and regulations. In particular, it discusses establishing an audit trail, supporting a forensics investigation after an incident. An audit trail is a chronological record that documents security-relevant events. Various log messages generated by software and hardware…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Definition and goals of computer forensics1m 20s
-
History3m 20s
-
Types of investigations2m 13s
-
Tools2m 49s
-
Legal implications3m 3s
-
(Locked)
Current and future trends3m 16s
-
(Locked)
Challenges3m 29s
-
(Locked)
Anti-forensics techniques3m 38s
-
(Locked)
Compliance and forensics2m 35s
-
(Locked)
Cybersecurity and forensics2m 16s
-
-
-
-
-
-
-
-