{"id":349974,"date":"2024-10-20T00:39:44","date_gmt":"2024-10-20T00:39:44","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-270432016\/"},"modified":"2024-10-26T00:23:46","modified_gmt":"2024-10-26T00:23:46","slug":"bs-en-iso-iec-270432016","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-270432016\/","title":{"rendered":"BS EN ISO\/IEC 27043:2016"},"content":{"rendered":"

This International Standard provides guidelines based on idealized models for common incident investigation processes across various incident investigation scenarios involving digital evidence. This includes processes from pre-incident preparation through investigation closure, as well as any general advice and caveats on such processes. The guidelines describe processes and principles applicable to various kinds of investigations, including, but not limited to, unauthorized access, data corruption, system crashes, or corporate breaches of information security, as well as any other digital investigation.<\/p>\n

In summary, this International Standard provides a general overview of all incident investigation principles and processes without prescribing particular details within each of the investigation principles and processes covered in this International Standard. Many other relevant International Standards, where referenced in this International Standard, provide more detailed content of specific investigation principles and processes.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
13<\/td>\n1\tScope
2\tNormative references
3\tTerms and definitions <\/td>\n<\/tr>\n
15<\/td>\n4\tSymbols and abbreviated terms <\/td>\n<\/tr>\n
16<\/td>\n5\tDigital investigations
5.1\tGeneral principles
5.2\tLegal principles <\/td>\n<\/tr>\n
17<\/td>\n6\tDigital investigation processes
6.1\tGeneral overview of the processes
6.2\tClasses of digital investigation processes <\/td>\n<\/tr>\n
19<\/td>\n7\tReadiness processes
7.1\tOverview of the readiness processes <\/td>\n<\/tr>\n
21<\/td>\n7.2\tScenario definition process
7.3\tIdentification of potential digital evidence sources process <\/td>\n<\/tr>\n
23<\/td>\n7.4\tPlanning pre-incident gathering, storage, and handling of data representing potential digital evidence process
7.5\tPlanning pre-incident analysis of data representing potential digital evidence process
7.6\tPlanning incident detection process
7.7\tDefining system architecture process <\/td>\n<\/tr>\n
24<\/td>\n7.8\tImplementing system architecture process
7.9\tImplementing pre-incident gathering, storage, and handling of data representing potential digital evidence process
7.10\tImplementing pre-incident analysis of data representing potential digital evidence process
7.11\tImplementing incident detection process <\/td>\n<\/tr>\n
25<\/td>\n7.12\tAssessment of implementation process
7.13\tImplementation of assessment results process
8\tInitialization processes
8.1\tOverview of initialization processes <\/td>\n<\/tr>\n
26<\/td>\n8.2\tIncident detection process <\/td>\n<\/tr>\n
27<\/td>\n8.3\tFirst response process
8.4\tPlanning process
8.5\tPreparation process <\/td>\n<\/tr>\n
28<\/td>\n9\tAcquisitive processes
9.1\tOverview of acquisitive processes
9.2\tPotential digital evidence identification process <\/td>\n<\/tr>\n
29<\/td>\n9.3\tPotential digital evidence collection process
9.4\tPotential digital evidence acquisition process
9.5\tPotential digital evidence transportation process
9.6\tPotential digital evidence storage and preservation process <\/td>\n<\/tr>\n
30<\/td>\n10\tInvestigative processes
10.1\tOverview of investigative processes <\/td>\n<\/tr>\n
31<\/td>\n10.2\tPotential digital evidence acquisition process
10.3\tPotential digital evidence examination and analysis process
10.4\tDigital evidence interpretation process
10.5\tReporting process <\/td>\n<\/tr>\n
32<\/td>\n10.6\tPresentation process
10.7\tInvestigation closure process
11\tConcurrent processes
11.1\tOverview of the concurrent processes <\/td>\n<\/tr>\n
33<\/td>\n11.2\tObtaining authorization process
11.3\tDocumentation process
11.4\tManaging information flow process
11.5\tPreserving chain of custody process <\/td>\n<\/tr>\n
34<\/td>\n11.6\tPreserving digital evidence process
11.7\tInteraction with physical investigation process
12\tDigital investigation process model schema <\/td>\n<\/tr>\n
36<\/td>\nAnnex\u00a0A (informative) Digital investigation processes: motivation for harmonization <\/td>\n<\/tr>\n
40<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Security techniques. Incident investigation principles and processes<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2016<\/td>\n46<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":349980,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-349974","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/349974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/349980"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=349974"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=349974"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=349974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}