From the course: CISSP Cert Prep (2021): 7 Security Operations
Unlock the full course today
Join today to access over 22,700 courses taught by industry experts or purchase this course individually.
Software forensics
From the course: CISSP Cert Prep (2021): 7 Security Operations
Software forensics
- [Instructor] Software code may be used as evidence in an investigation, and software forensic techniques may be used to analyze that software in an effort to render an expert opinion. There are two major uses of software forensics in today's cybersecurity environment. First, software forensics are often used to help resolve intellectual property disputes between parties. This is a very common occurrence in civil disputes, and software forensic specialists are often used in court to testify about the origins of software code. For example, suppose a key developer leaves a company and accepts a position at a competitor. The competitor may then later release a new product version that includes features very similar to the first company's product. The first company may accuse the competitor of using the hired software developer to steal code. The competitor may respond that they independently developed the new feature…
Contents
-
-
-
Conducting investigations3m 50s
-
(Locked)
Evidence types3m 28s
-
(Locked)
Introduction to forensics3m 21s
-
(Locked)
System and file forensics4m 26s
-
(Locked)
Network forensics4m 1s
-
(Locked)
Software forensics4m 25s
-
(Locked)
Mobile device forensics1m 10s
-
(Locked)
Embedded device forensics2m 30s
-
(Locked)
Chain of custody1m 50s
-
(Locked)
Reporting and documenting incidents3m 58s
-
(Locked)
Electronic discovery (ediscovery)3m 3s
-
-
-
-
-
-
-
-