Services on Demand
Journal
Article
Indicators
- Cited by SciELO
- Access statistics
Related links
- Similars in SciELO
Share
Enfoque UTE
On-line version ISSN 1390-6542Print version ISSN 1390-9363
Abstract
PROANO-ESCALANTE, Rodrigo Arturo and GAVILANES-MOLINA, Andrés Fernando. Strategy for responding to computer incidents of insecurity set in Ecuadorian law. Enfoque UTE [online]. 2018, vol.9, n.1, pp.90-101. ISSN 1390-6542. https://doi.org/10.29019/enfoqueute.v9n1.229.
Assurance the security of information, information systems, services and networks implies socializing, also knowing how to respond to an event where such information security has been violated and how manage the identified digital evidence. The present paper is a solution, based on international standards and complying with the current Law of Ecuador. Digital evidence will be identified at the scene of a computer incident by the authorized persons. The authorization must indicate what motivates, authorizes and limits the identification of evidence. The phase of obtaining the digital evidence identified will depend on the established internal circumstances and policies. The preservation of the objective evidence is carried out through chain of custody, the verifiable, complete and reliable results are reported. The previously described strategy was applied as a case study to the incidents of violation of logical securities. The digital evidence found in the place was recognized, extracted, preserved and informed about. Throughout the process, the chain of custody was implemented, which assurance the integrity and reliability of the data. In each phase it was recorded as, when, where and who manipulated both digital signs and digital devices.
Keywords : informatic security; cybercrime; computer forensics; incident; digital evidence..