An analysis of forensics evidence gathering for assistance in network intruder prosecution

This research develops a roadmap of legal evidence-gathering steps to assist law enforcement agencies in the identification of network intruders. This checklist will not only assist administrators in conducting network defense and safeguarding evidence but will assist them in remaining within the gu...

Full description

Bibliographic Details
Main Author: Kirtley, Steven W.
Other Authors: Syed R. Ali
Language:en_US
Published: Monterey, California: Naval Postgraduate School 2012
Online Access:http://hdl.handle.net/10945/13522
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-13522
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-135222014-11-27T16:10:26Z An analysis of forensics evidence gathering for assistance in network intruder prosecution Kirtley, Steven W. Syed R. Ali Daniel F. Warren. This research develops a roadmap of legal evidence-gathering steps to assist law enforcement agencies in the identification of network intruders. This checklist will not only assist administrators in conducting network defense and safeguarding evidence but will assist them in remaining within the guidelines of the law in their network defense efforts. Legal responsibilities of network managers are highlighted with respect to legal document requirements and issues of U. S. Marine Corps liability. The aforementioned roadmap development is achieved by: 1) examining the latest advances and trends in network intrusion techniques, 2) investigating current U.S. Navy and U.S. Marine Corps Computer Network Incident Response Policies, 3) researching the current and proposed legislation covering the issue of forensic evidence requirements and preservation, and 4) examining forensics evidence gathering techniques with a focus on individual privacy rights. 2012-09-07T15:34:35Z 2012-09-07T15:34:35Z 1999-06 Thesis http://hdl.handle.net/10945/13522 en_US Approved for public release, distribution unlimited. Monterey, California: Naval Postgraduate School
collection NDLTD
language en_US
sources NDLTD
description This research develops a roadmap of legal evidence-gathering steps to assist law enforcement agencies in the identification of network intruders. This checklist will not only assist administrators in conducting network defense and safeguarding evidence but will assist them in remaining within the guidelines of the law in their network defense efforts. Legal responsibilities of network managers are highlighted with respect to legal document requirements and issues of U. S. Marine Corps liability. The aforementioned roadmap development is achieved by: 1) examining the latest advances and trends in network intrusion techniques, 2) investigating current U.S. Navy and U.S. Marine Corps Computer Network Incident Response Policies, 3) researching the current and proposed legislation covering the issue of forensic evidence requirements and preservation, and 4) examining forensics evidence gathering techniques with a focus on individual privacy rights.
author2 Syed R. Ali
author_facet Syed R. Ali
Kirtley, Steven W.
author Kirtley, Steven W.
spellingShingle Kirtley, Steven W.
An analysis of forensics evidence gathering for assistance in network intruder prosecution
author_sort Kirtley, Steven W.
title An analysis of forensics evidence gathering for assistance in network intruder prosecution
title_short An analysis of forensics evidence gathering for assistance in network intruder prosecution
title_full An analysis of forensics evidence gathering for assistance in network intruder prosecution
title_fullStr An analysis of forensics evidence gathering for assistance in network intruder prosecution
title_full_unstemmed An analysis of forensics evidence gathering for assistance in network intruder prosecution
title_sort analysis of forensics evidence gathering for assistance in network intruder prosecution
publisher Monterey, California: Naval Postgraduate School
publishDate 2012
url http://hdl.handle.net/10945/13522
work_keys_str_mv AT kirtleystevenw ananalysisofforensicsevidencegatheringforassistanceinnetworkintruderprosecution
AT kirtleystevenw analysisofforensicsevidencegatheringforassistanceinnetworkintruderprosecution
_version_ 1716722058959781888