ISMS role in the improvement of digital forensics related process in SOC's

06/15/2020
by   Masoud Hayeri Khyavi, et al.
0

Organizations concerned about digital or computer forensics capability which establishes procedures and records to support a prosecution for computer crimes could benefit from implementing an ISO 27001: 2013-compliant (ISMS Information Security Management System). A certified ISMS adds credibility to information gathered in a digital forensics investigation; certification shows that the organization has an outsider which verifies that the correct procedures are in place and being followed. A certified ISMS is a valuable tool either when prosecuting an intruder or when a customer or other stakeholder seeks damages against the organization. SOC (Security Operation Center) as an organization or a security unit which handles a large volume of information requires a management complement, where ISMS would be a good choice. This idea will help finding solutions for problems related to digital forensics for non-cloud and cloud digital forensics, including Problems associated with the absence of standardization amongst different CSPs (Cloud service providers).

READ FULL TEXT
research
09/25/2018

Analyzing CDR/IPDR data to find People Network from Encrypted Messaging Services

Organizations maintaining personal details of their users have to adhere...
research
08/30/2022

A Comparative Study On Three Selective Cloud Providers

Cloud Computing means a place where we can store our valuable informatio...
research
03/06/2023

Planning Distributed Security Operations Centers in Multi-Cloud Landscapes: A Case Study

We present a case study on the strategic planning of a security operatio...
research
03/06/2023

Role of ERP Modernization in Digital Transformation: PeopleSoft Insight

The role of Enterprise Resource Planning (ERP) systems with digital tran...
research
02/10/2018

Security level analysis of academic information systems based on standard ISO 27002:2003 using SSE-CMM

This research was conducted to find out the level of information securit...
research
08/25/2023

Implementing Snort Intrusion Prevention System (IPS) for Network Forensic Analysis

The security trade confidentiality, integrity and availability are the m...

Please sign up or login with your details

Forgot password? Click here to reset