Page 1349 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1349

Investigations


               Every information security professional will, at one time or another,
               encounter a security incident that requires an investigation. In many
               cases, this investigation will be a brief, informal determination that the

               matter is not serious enough to warrant further action or the
               involvement of law enforcement authorities. However, in some cases,
               the threat posed or damage done will be severe enough to require a
               more formal inquiry. When this occurs, investigators must be careful
               to ensure that proper procedures are followed. Failure to abide by the

               correct procedures may violate the civil rights of those individual(s)
               being investigated and could result in a failed prosecution or even
               legal action against the investigator.


               Investigation Types

               Security practitioners may find themselves conducting investigations

               for a wide variety of reasons. Some of these investigations involve law
               enforcement and must follow rigorous standards designed to produce
               evidence that will be admissible in court. Other investigations support
               internal business processes and require much less rigor.


               Administrative Investigations

               Administrative investigations are internal investigations that examine
               either operational issues or a violation of the organization’s policies.
               They may be conducted as part of a technical troubleshooting effort or

               in support of other administrative processes, such as Human
               Resources disciplinary procedures.

               Operational investigations examine issues related to the organization’s
               computing infrastructure and have the primary goal of resolving
               operational issues. For example, an information technology (IT) team
               noticing performance issues on their web servers may conduct an

               operational investigation designed to determine the cause of the
               performance problems.
   1344   1345   1346   1347   1348   1349   1350   1351   1352   1353   1354