Malware Forensics

  • Hummert C
N/ACitations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter explores the legal regulatory and discusses some of the requirements or limitations that may govern the access, preservation, collection, and movement of data and digital artifacts uncovered during Malware forensic investigations. Digital investigators, unlike security vendors, researchers, and academics, often wade through a different legal and regulatory landscape when conducting Malware analysis for investigative purposes, particularly where a corporate or individual victim's pursuit of a civil or criminal remedy serves the ultimate end game. The goal provided is assistance in thinking about how best to gather Malware forensic evidence in a way that is reliable, repeatable, and ultimately admissible. Because the legal and regulatory landscape surrounding sound methodologies and best practices is admittedly complicated and often unclear, one should identify and retain appropriate legal counsel and obtain necessary legal advice before conducting any Malware forensic investigation. Framing and re-framing investigative objectives and goals early and often remain the keys to any successful investigation.

Cite

CITATION STYLE

APA

Hummert, C. (2017). Malware Forensics. In Forensik in der digitalen Welt (pp. 199–214). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-53801-2_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free