{"id":349973,"date":"2024-10-20T00:39:44","date_gmt":"2024-10-20T00:39:44","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-270422016\/"},"modified":"2024-10-26T00:23:45","modified_gmt":"2024-10-26T00:23:45","slug":"bs-en-iso-iec-270422016","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-270422016\/","title":{"rendered":"BS EN ISO\/IEC 27042:2016"},"content":{"rendered":"
This International Standard provides guidance on the analysis and interpretation of digital evidence in a manner which addresses issues of continuity, validity, reproducibility, and repeatability. It encapsulates best practice for selection, design, and implementation of analytical processes and recording sufficient information to allow such processes to be subjected to independent scrutiny when required. It provides guidance on appropriate mechanisms for demonstrating proficiency and competence of the investigative team.<\/p>\n
Analysis and interpretation of digital evidence can be a complex process. In some circumstances, there can be several methods which could be applied and members of the investigative team will be required to justify their selection of a particular process and show how it is equivalent to another process used by other investigators. In other circumstances, investigators may have to devise new methods for examining digital evidence which has not previously been considered and should be able to show that the method produced is \u201cfit for purpose\u201d.<\/p>\n
Application of a particular method can influence the interpretation of digital evidence processed by that method. The available digital evidence can influence the selection of methods for further analysis of digital evidence which has already been acquired.<\/p>\n
This International Standard provides a common framework, for the analytical and interpretational elements of information systems security incident handling, which can be used to assist in the implementation of new methods and provide a minimum common standard for digital evidence produced from such activities.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
4<\/td>\n | European foreword Endorsement notice <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1\tScope 2\tNormative references 3\tTerms and definitions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4\tSymbols and abbreviated terms 5\tInvestigation 5.1\tOverview <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.2\tContinuity 5.3\tRepeatability and reproducibility 5.4\tStructured approach <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.5\tUncertainty <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6\tAnalysis 6.1\tOverview 6.2\tGeneral principles <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.3\tUse of tools 6.4\tRecord keeping 7\tAnalytical models 7.1\tStatic analysis 7.2\tLive analysis 7.2.1\tOverview <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.2.2\tLive analysis of non-imageable and non-copyable systems 7.2.3\tLive analysis of imageable or copyable systems 8\tInterpretation 8.1\tGeneral 8.2\tAccreditation of fact <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8.3\tFactors affecting interpretation 9\tReporting 9.1\tPreparation 9.2\tSuggested report content <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 10\tCompetence 10.1\tOverview 10.2\tDemonstration of competence 10.3\tRecording competence <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 11\tProficiency 11.1\tOverview 11.2\tMechanisms for demonstration of proficiency <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Annex\u00a0A (informative) Examples of Competence and Proficiency Specifications <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Security techniques. Guidelines for the analysis and interpretation of digital evidence<\/b><\/p>\n |