- Understanding Key Points of the Follow-Up Phase
- Acquiring the Evidence
- Authenticating, Preserving, and Analyzing Incident Data
- Conducting Post-Incident Activities
- Using Legal, Investigative, and Government Recourses
- Article Series
- References
- Acknowledgments
- About the Author
- Ordering Sun Documents
- Accessing Sun Documentation Online
References
The following lists the references that were used for this article:
CERT. "Identifying Tools that Aid in Detecting Signs of Intrusion" (Tools for real time and forensic analysis), at: http://www.cert.org/security-improvement/implementations/i042.07.html
Electronic Crimes Task Force and Helpful Links, at: http://www.ectaskforce.org/ and http://www.ectaskforce.org/Helpful_Links.htm
Feldman, J. "The Essentials of Computer Discovery," 2002, at: http://www.forensics.com
FIRST. Registered teams, at: http://www.first.org/team-info/
Germany's DFN-CERT. Logsurfer home page, at: http://www.cert.dfn.de/eng/logsurf/
Masurkar, Vijay. "Responding to a Customer's Security IncidentsPart 1: Establishing Teams and a Policy." Sun BluePrints OnLine, March 2003, at: http://www.sun.com/solutions/blueprints/
Masurkar, Vijay. "Responding to a Customer's Security IncidentsPart 2: Executing a Policy." Sun BluePrints OnLine, April 2003, at: http://www.sun.com/solutions/blueprints/
Medford Police, at: http://www.medfordpolice.org/
Noordergraaf, Alex. "Enterprise Security: Solaris Operating Environment." Prentice Hall, 2002.
Rude, T. "DD and Computer Forensics: Examples of Using DD within UNIX to Create Physical Backups," at: http://www.crazytrain.com/dd.html
Sun Microsystems, Inc. Solaris Security Toolkit, at: http://www.sun.com/software/security/jass and http://www.sun.com/blueprints/tools