Forensics in Business Continuity Planning

F
  1. Important Cybercrime Laws
  2. Yet More Theft of Information Assets
  3. Preparation Phase of a Digital Search
  4. Data Hiding and Steganography
  5. Confusion over Terminology
  6. Presenting Digital Evidence
  7. Remote Access Trojans
  8. Malicious Code Detection
  9. What is the Role of Computer Forensics?
  10. Forensics in Business Continuity Planning
  11. An analysis of different data sources used in a forensics investigation
  12. Business Continuity Analysis

Business continuity planning in any organization today must incorporate aspects of computer forensics in order to be sustainable. According to Majore, Yoo & Shon (2014) in their article on secure and reliable electronic record management, over 90% of records created today are electronic. In addition to this electronic records require a greater amount of maintenance due to their volatility and dependence on reliable hardware and software. In continuity planning, organizations must face these challenges head on and prepare strategies that integrate digital forensics disciplines into their underlying processes.

In his article on digital forensics and its role in protecting the enterprise, Kenyon, P (2012) breaks down the usefulness of forensics in business continuity into two categories, reactive forensics and proactive forensics. Reactive of course includes post mortem analysis in order to glean knowledge and lessons learned. Proactive on the other hand refers to processes that can be integrated with continuity processes including but not limited to early warning systems and detection of potential anomalies and threats. As both the disciplines of business continuity and digital forensics evolve, they will continue to compliment each other in order to better prepare organizations for disaster recovery and ultimately protecting their digital assets.

References:

Kenyon, P (2012). Digital forensics and its role in protecting the enterprise. Continuity Central Archive. Retrieved from: http://www.continuitycentral.com/feature1010.html

Majore, S., Yoo, H., & Shon, T. (2014). Secure and reliable electronic record management system using digital forensic technologies. Journal Of Supercomputing, 70(1), 149-165. doi:10.1007/s11227-014-1137-6

About the author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

About Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Follow Me