Chad Nelley - Cyber Security Operations & Leadership
  • Home
  • About
  • OPS Portfolio
    • Early Career
    • Core Career
    • Nelley Consulting, LLC
    • Boards & Non-Profit Experience
  • CS Portfolio
    • Cybersecurity Fundamentals
    • Cryptography
    • Security Architecture >
      • Conceptual Security Architecture
      • Logical Security Architecture
      • Physical Security Architecture
      • Component Security Architecture
      • Governance & CS Operations
    • Operational Policy >
      • Policy Charter & Compliance
      • Mobile & Antivirus Policy
      • Privacy Policy & Classification
    • Risk Management
    • Management & Cybersecurity
    • Secure Software Design & Development
    • Network Visualization
    • Cyber Threat Intelligence
    • Incident Response & Forensics
  • SC Resource Links
    • Cyber Education
    • Industry Resources
    • Cybersecurity News
    • Cyber Economic Development
    • Cryptography Links
    • Security Architecture Links
    • Operational Policy Links
    • Risk Management Links
    • Management & Cybersecurity Links
    • Secure Software Design & Development Links
    • Network Visualization & Vulnerability Links
    • Cyber Threat Intelligence Links
    • Incident Response & Forensics Links
  • Contact
  • Home
  • About
  • OPS Portfolio
    • Early Career
    • Core Career
    • Nelley Consulting, LLC
    • Boards & Non-Profit Experience
  • CS Portfolio
    • Cybersecurity Fundamentals
    • Cryptography
    • Security Architecture >
      • Conceptual Security Architecture
      • Logical Security Architecture
      • Physical Security Architecture
      • Component Security Architecture
      • Governance & CS Operations
    • Operational Policy >
      • Policy Charter & Compliance
      • Mobile & Antivirus Policy
      • Privacy Policy & Classification
    • Risk Management
    • Management & Cybersecurity
    • Secure Software Design & Development
    • Network Visualization
    • Cyber Threat Intelligence
    • Incident Response & Forensics
  • SC Resource Links
    • Cyber Education
    • Industry Resources
    • Cybersecurity News
    • Cyber Economic Development
    • Cryptography Links
    • Security Architecture Links
    • Operational Policy Links
    • Risk Management Links
    • Management & Cybersecurity Links
    • Secure Software Design & Development Links
    • Network Visualization & Vulnerability Links
    • Cyber Threat Intelligence Links
    • Incident Response & Forensics Links
  • Contact

Incident Response & Forensics Links

For more information on Incident Response & Digital Forensics please see the following links:

Nance | Ryan, 2011, Legal Aspects of Digital Forensics https://www.computer.org/csdl/proceedings/hicss/2011/4282/00/10-04-03.pdf
Newcomb, 2013, Teen Charged in Fatal Cyberbullying Case of Rebecca Sedwick to Remain in Jail http://abcnews.go.com/US/teen-charged-fatal-cyberbullying-case-rebecca-sedwick-remain/story?id=20580689
Parker, 2012, The Story of a Suicide, http://www.newyorker.com/magazine/2012/02/06/the-story-of-a-suicide
Kranz, Unknown, Case Study: Jessica Logan, https://cyberbullying.ua.edu/index.php/case-study-jessica-logan/
Unknown, 2014, SWGDE Focused Collection and Examination of Digital Evidence, https://www.swgde.org/documents/Current%20Documents/SWGDE%20Focused%20Collection%20and%20Examination%20of%20Digital%20Evidence
Unknown, 2014, SWGDE Focused Collection and Examination of Digital Evidence, https://www.swgde.org/documents/Current%20Documents
Ayers | Brothers| Jansen, 2014, Guidelines on Mobile Device Forensics  http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-101r1.pdf
http://www.sleuthkit.org/autopsy/index.php
https://www.guidancesoftware.com/encase-forensic?cmpid=nav_r
https://www.nuix.com/
http://www.oxid.it/cain.html
http://www.accessdata.com/products-services/forensic-toolkit-ftk
http://www.x-ways.net/forensics/index-m.html

Proudly powered by Weebly