Software code may be used as evidence in an investigation and software forensic techniques may be used to analyze that software in an effort to render an expert opinion. In this video, learn how software forensic techniques may be used to draw evidentiary conclusions.
- [Narrator] Software code may be used…as evidence in an investigation,…and software forensic techniques…may be used to analyze that software…in an effort to render an expert opinion.…There are two major uses of software forensics…in today's cybersecurity environment.…First, software forensics are often used…to help resolve intellectual property…disputes between parties.…This is a very common occurrence in civil disputes,…and software forensic specialists…are often used in court to testify…about the origins of software code.…
For example, suppose a key software developer…leaves a company and accepts a position at a competitor.…The competitor may then later release…a new product version that includes features…very similar to the first company's product.…The first company may accuse the competitor…of using the newly hired software developer to steal code.…The competitor may respond that they independently developed…the new feature without any help from the new hire…or access to the competitor's software code.…
Software forensics experts may analyze the code…
- Building an incident response program
- Escalation and notification
- eDiscovery process
- Conducting investigations
- System and file forensics
- Reporting and documenting incidents
- Business continuity planning
- Validating backups
- Testing BC/DR plans
Skill Level Intermediate
Q: This course was updated on 06/01/2018. What changed?
A: We updated three videos, covering creating an incident response program, communications plan, and response team.