Computer Security Resources for Conducting PC Forensic Investigations

Computer Security Resources for Conducting PC Forensic Investigations

Computer security is a field of computer science concerned with the control of risks related to computer use.  The term computer security may involve a wide range of security-related topics such as:

  • Internet security breaches
  • Server security and protection methods
  • Operating system security (e.g. Windows security)
  • Data and information security
  • Computer network and wireless networks
  • Security software (e.g. anti-virus software)

The following tools may be useful in conducting investigations into computer security or computer-related investigations:

CERT – Established in 1988, the CERT® Coordination Center (CERT/CC) is a center of Internet security expertise, located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.

Computer Monitoring Software – A collection of resources and software used to monitor computer and network activity.

Computer Crime Books – A collection of computer crime books and computer security books from Amazon.com

US-CERT – US-CERT is a partnership between the Department of Homeland Security and the public and private sectors. Established to protect the nation’s Internet infrastructure, US-CERT coordinates defense against and responses to cyber attacks across the nation.

FIRST brings together a variety of computer security incident response teams from government, commercial, and educational organizations. FIRST aims to foster cooperation and coordination in incident prevention, to stimulate rapid reaction to incidents, and to promote information sharing among members and the community at large.

HTCIA – The High Technology Crime Investigation Association (HTCIA) is designed to encourage, promote, aid and effect the voluntary interchange of data, information, experience, ideas and knowledge about methods, processes, and techniques relating to investigations and security in advanced technologies among its membership.

IACIS – IACIS® is an international volunteer non-profit corporation composed of law enforcement professionals dedicated to education in the field of forensic computer science. IACIS members represent Federal, State, Local and International Law Enforcement professionals. Regular IACIS members have been trained in the forensic science of seizing and processing computer systems.

IEEE Computer Society – With nearly 100,000 members, the IEEE Computer Society is the world’s leading organization of computer professionals. Founded in 1946, it is the largest of the 37 societies of the Institute of Electrical and Electronics Engineers (IEEE).  The Computer Society’s vision is to be the leading provider of technical information and services to the world’s computing professionals. The Society is dedicated to advancing the theory, practice, and application of computer and information processing technology.

Microsoft Security Updates – Get information on the latest software / computer security updates.

Government Resources

InfraGard – InfraGard is a Federal Bureau of Investigation (FBI) program that began in the Cleveland Field Office in 1996. It was a local effort to gain support from the information technology industry and academia for the FBI’s investigative efforts in the cyber arena. The program expanded to other FBI Field Offices, and in 1998 the FBI assigned national program responsibility for InfraGard to the former National Infrastructure Protection Center (NIPC) and to the Cyber Division in 2003. InfraGard and the FBI have developed a relationship of trust and credibility in the exchange of information concerning various terrorism, intelligence, criminal, and security matters

National Computer Security Clearinghouse – National Computer Security Clearinghouse

NIST Computer Forensics Tool Testing – Computer forensics tool testing documents

FTC Identity Theft Resources – A one-stop national resource to learn about the crime of identity theft. It provides detailed information to help you protect yourself from identity theft, and the steps to take if it occurs. It is also a comprehensive reference center – for consumers, businesses, law enforcement, and the media – with access to specific laws, contact information, and resources from state and federal government agencies.

Internet Fraud Complaint Center – The Internet Crime Complaint Center (IC3) is a partnership between theFederal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). IC3’s mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal, state, local and international level, IC3 provides a central referral mechanism for complaints involving Internet related crimes

National White Collar Crime Center – The National White Collar Crime Center is focused on providing nationwide support for agencies involved in the prevention, investigation, and prosecution of economic and high-tech crimes. In addition, the center supports and partners with other appropriate entities to address homeland security initiatives, as they relate to economic and high-tech crimes.


Related Articles

Anti-Virus Software for Protecting Computers from Malicious Programs

What is Anti-Virus Software? Computer viruses can have a major negative impact on a business, especially a small business. As a result,

List of Server Error Codes for Computer Forensic Investigations

When a web browser requests a service from a web server, there is always a possibility that an error might

Yahoo! Products and Services for Business Owners

About Yahoo Yahoo was founded in 1994 by Stanford Ph.D. students David Filo and Jerry Yang. Yahoo! began as a

No comments

Write a comment
No Comments Yet! You can be first to comment this post!

Write a Comment

Your e-mail address will not be published.
Required fields are marked*


*