Page 1377 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1377

Summary


               Information security professionals must be familiar with the
               investigation process. This involves gathering and analyzing the
               evidence required to conduct an investigation. Security professionals

               should be familiar with the major categories of evidence, including
               real evidence, documentary evidence, and testimonial evidence.
               Electronic evidence is often gathered through the analysis of
               hardware, software, storage media, and networks. It is essential to
               gather evidence using appropriate procedures that do not alter the

               original evidence and preserve the chain of custody.
               Computer crimes are grouped into several major categories, and the

               crimes in each category share common motivations and desired
               results. Understanding what an attacker is after can help in properly
               securing a system.

               For example, military and intelligence attacks are launched to acquire
               secret information that could not be obtained legally. Business attacks
               are similar except that they target civilian systems. Other types of

               attacks include financial attacks (phone phreaking is an example of a
               financial attack) and terrorist attacks (which, in the context of
               computer crimes, are attacks designed to disrupt normal life). Finally,
               there are grudge attacks, the purpose of which is to cause damage by
               destroying data or using information to embarrass an organization or
               person, and thrill attacks, launched by inexperienced crackers to

               compromise or disable a system. Although generally not sophisticated,
               thrill attacks can be annoying and costly.

               The set of rules that govern your personal behavior is a code of ethics.
               There are several codes of ethics, from general to specific in nature,
                                                                                              2
               that security professionals can use to guide them. The (ISC)  makes
               the acceptance of its Code of Ethics a requirement for certification.
   1372   1373   1374   1375   1376   1377   1378   1379   1380   1381   1382