It is important to us that you purchase the right document. Although we endeavour to maintain an up-to-date catalogue, on occasion we may not have the latest. Purchase your copy of BS EN ISO/IEC as a PDF download or hard copy directly from the official BSI Shop. All BSI British Standards. Information technology – Security techniques – Guidelines for the analysis and interpretation of digital evidence (ISO/IEC ); German version EN.
|Country:||United Arab Emirates|
|Published (Last):||23 September 2009|
|PDF File Size:||11.35 Mb|
|ePub File Size:||13.66 Mb|
|Price:||Free* [*Free Regsitration Required]|
This website is best viewed with browser version of up to Microsoft Internet Explorer 8 or Firefox 3.
INCITS: New Adoption – INCITS/ISO/IEC [x]
The standard touches on issues such as the selection and use of forensic tools, plus proficiency and competency of the investigators. Learn more about the cookies we use and how to change your settings. Accept and continue Learn more about the cookies we use and how to change your settings. Please download Chrome or Firefox or view our browser tips. Although we endeavour to maintain an up-to-date catalogue, on occasion we may not iiso the latest version of a document, including where it has not yet been provided through an oec feed.
BS ISO/IEC 27042:2015
It is designed to cover every economic sector and virtually every activity of the humankind where technical standards may be used. You may find similar items within these categories by selecting from the choices below:.
Information Systems Security Standards Handbook You may be interested in this related standard Information technology – Security techniques – Information security management systems – Requirements You may be interested in this related standard. Creative security awareness ieec for your ISMS.
If you need help with the purchase or have any queries please email enquiries standards. In other circumstances, investigators may have to devise new methods for examining digital evidence which has not previously been considered and should be able to show that the method produced is “fit for purpose”.
Communication networks, Information exchange, Data security, Open systems interconnection, Computer technology, Data processing, Computer networks.
So, sorry customers, it oso you will have to buy and correlate multiple standards to accumulate the complete forensics suite in ISO27k. Final text received or FDIS registered for formal approval. Click to learn more.
No published date found. Proof sent to secretariat or FDIS ballot initiated: In some circumstances, there can be several methods which could be applied and members of the investigative team will be required to justify their selection of a particular process and show how it is equivalent to another process used by other investigators.
The editors have rejected such a proposal, claiming that it was considered and rejected when the forensics standards development projects were launched.
It encapsulates best practice for selection, design, and implementation of analytical processes and recording sufficient information to allow such processes to be subjected to independent scrutiny when required. The available digital evidence can influence the selection of methods for further analysis of digital evidence which has already been acquired. Guidelines for the analysis and interpretation of digital evidence Status: Find Similar Items This product falls into the following categories.
Application of a particular method can influence the interpretation of digital evidence processed by that method. Your basket is empty. Monday to Friday – It lays out a generic framework encapsulating 270042 practices in this area. It provides guidance on appropriate mechanisms for demonstrating proficiency and competence of the investigative team.
This standard covers what happens after digital evidence has iev collected i. We recommend that you check the website of the publishers of the international document before making a purchase.
The standard was published in British Standard BS Follow these links to find other Standards similar to the one you are viewing.
I am puzzled why SC 27 is developing several distinct forensics standards, covering different aspects of forensics, when they are in reality complementary parts of the same process.
Personal comments I am puzzled why SC 27 is developing several distinct forensics standards, covering different aspects of forensics, when kec are in reality complementary parts of the same process.