Chapter 10

Enable Targeted Monitoring

Abstract

Until this point, focus has been on collecting digital evidence for the purposes of supporting one of the major business risk scenarios. However, by monitoring the indirect data sources that provide context to the major business risk scenarios, organizations can identify and detect events before they become major incidents.

Keywords

Acceptable activity; Analytics; Modern controls; Monitoring; Network security
 
This chapter discusses the sixth step for implementing a digital forensic readiness program as enabling targeted monitoring in critical locations through the organization to improve early incident detection. In addition to gathering digital evidence in support of the major business risk scenarios, ...

Get Implementing Digital Forensic Readiness now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.