Published: September 01, 2006
Timothy Grance, Suzanne Chevalier, Karen Kent Scarfone, Hung Dang
This publication is intended to help organizations in investigating computer security incidents and troubleshooting some information technology (IT) operational problems by providing practical guidance on performing computer and network forensics. The guide presents forensics from an IT view, not a law enforcement view. Specifically, the publication describes the processes for performing effective forensics activities and provides advice regarding different data sources, including files, operating systems (OS), network traffic, and applications. The publication is not to be used as an all-inclusive step-by-step guide for executing a digital forensic investigation or construed as legal advice. Its purpose is to inform readers of various technologies and potential ways of using them in performing incident response or troubleshooting activities. Readers are advised to apply the recommended practices only after consulting with management and legal counsel for compliance concerning laws and regulations (i.e., local, state, Federal, and international) that pertain to their situation.
Citation: Special Publication (NIST SP) - 800-86Report Number:
NIST Pub Series: Special Publication (NIST SP)
Pub Type: NIST Pubs
FISMA, Forensics, Incident Response
Created September 01, 2006, Updated February 19, 2017