Reader small image

You're reading from  Digital Forensics and Incident Response - Second Edition

Product typeBook
Published inJan 2020
Reading LevelBeginner
Publisher
ISBN-139781838649005
Edition2nd Edition
Languages
Concepts
Right arrow
Author (1)
Gerard Johansen
Gerard Johansen
author image
Gerard Johansen

Gerard Johansen is an information security professional with over a decade of experience in penetration testing, vulnerability management, threat assessment modeling, and incident response. Beginning his career as a cyber crime investigator, he has also worked as a consultant and security analyst for clients and organizations ranging from healthcare to finance. He is a graduate from Norwich University, gaining an MSc in Information Assurance and also a CISSP, and is currently employed with an international information technology services firm that specializes in incident response and threat intelligence.
Read more about Gerard Johansen

Right arrow

Preparing a stage drive

Beyond having the necessary hardware and software to perform forensic imaging, it is critical to prestage a location to hold the image or evidence file. For incident response teams, the best thing to utilize as an evidence repository is an external USB or FireWire disk drive. This allows for a degree of portability as incident responders may have to investigate an incident offsite or at a variety of locations without the benefit of a forensic laboratory.

There are two tasks that need to be performed on evidence drives prior to their use. The first is to ensure that the repository is free of any data. Incident response teams should have a policy and procedure that dictate that an evidence drive be wiped prior to each use. This includes drives that are new in box. This is due to the fact that a number of manufacturers ship drives with backup software or other...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Digital Forensics and Incident Response - Second Edition
Published in: Jan 2020Publisher: ISBN-13: 9781838649005

Author (1)

author image
Gerard Johansen

Gerard Johansen is an information security professional with over a decade of experience in penetration testing, vulnerability management, threat assessment modeling, and incident response. Beginning his career as a cyber crime investigator, he has also worked as a consultant and security analyst for clients and organizations ranging from healthcare to finance. He is a graduate from Norwich University, gaining an MSc in Information Assurance and also a CISSP, and is currently employed with an international information technology services firm that specializes in incident response and threat intelligence.
Read more about Gerard Johansen