RE: Forensic/Cyber Crime Investigator




Definately friendly. Please do not see anything in any other manner.

I am firstly enjoying the debate and secondly debate is the heart of knowledge. Even if neither party comes to an agreement on terms at least a good debate on the subject should give each party a better understanding of their own perspective and a more logical manner of comprehension.

More on the other responses later this morning...

Regards
Craig

-----Original Message-----
From: dave kleiman [mailto:dave@xxxxxxxxxxxxxxx]
Sent: Fri 10/02/2006 3:44 AM
To: security-basics@xxxxxxxxxxxxxxxxx
Cc:
Subject: RE: Forensic/Cyber Crime Investigator
Craig,

I hope you are taking this as a friendly discussion

Answers inline..

-----Original Message-----
From: Craig Wright


Virus attacks etc as you put are incidents. The average
(and all but maybe a rare exception) organisation will
treat these as incidents. They do not take them to court
nor have the intention of doing such. To take your Virus
example. This is an incident, it requires a response. It
does not require a forensic analysis of the system, nor
would this be generally done..... etc




Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists.

DISCLAIMER
The information contained in this email and any attachments is confidential. If you are not the intended recipient, you must not use or disclose the information. If you have received this email in error, please inform us promptly by reply email or by telephoning +61 2 9286 5555. Please delete the email and destroy any printed copy.

Any views expressed in this message are those of the individual sender. You may not rely on this message as advice unless it has been electronically signed by a Partner of BDO or it is subsequently confirmed by letter or fax signed by a Partner of BDO.

BDO accepts no liability for any damage caused by this email or its attachments due to viruses, interference, interception, corruption or unauthorised access.