{"id":171,"date":"2011-01-20T00:05:54","date_gmt":"2011-01-19T22:05:54","guid":{"rendered":"http:\/\/it-news-blog.com\/?p=171"},"modified":"2019-04-15T19:26:31","modified_gmt":"2019-04-15T17:26:31","slug":"computer-forensik-alexander-geschonneck","status":"publish","type":"post","link":"https:\/\/it-news-blog.com\/?p=171","title":{"rendered":"Computer-Forensik &#8211; Alexander Geschonneck"},"content":{"rendered":"<p>Systemeinbr\u00fcche erkennen, ermitteln, aufkl\u00e4ren<\/p>\n<p>dpunkt-Verlag &#8211; ISBN-10: 3898645347<a href=\"https:\/\/it-news-blog.com\/wp-content\/uploads\/2011\/01\/computerforensikjpg1.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-full wp-image-200\" title=\"computerforensikjpg\" src=\"https:\/\/it-news-blog.com\/wp-content\/uploads\/2011\/01\/computerforensikjpg1.jpg\" alt=\"\" width=\"170\" height=\"247\" \/><\/a><\/p>\n<p>Computer-Forensik ist das Bindeglied zwischen der Incident Response, der Bew\u00e4ltigung der Folgen und Sch\u00e4den eines Vorfalls oder Angriffs, und einer erfolgreichen Strafverfolgung\/eines Schadensersatzes: wie waren\/sind die technischen Vorg\u00e4nge, welche Form von Straftat liegt vor, warum konnte es passieren &#8212; Aufkl\u00e4rung, Feststellung und zuk\u00fcnftige Pr\u00e4vention. Mit Computer-Forensik Systemeinbr\u00fcche erkennen, ermitteln, aufkl\u00e4ren definiert und fokussiert Geschonneck die Ziele und die Arbeit eines IT-Forensikers verst\u00e4ndlich mit Hintergrund, Praxisanwendung und Beispielen.<\/p>\n<p>Laut Geschonneck lautet das Mantra eines Forensikers: &#8222;Planen &#8212; Beweise sichern &#8212; Beweise sch\u00fctzen &#8212; Untersuchen &#8212; Bewerten &#8212; Dokumentieren.&#8220; Wichtig ist dabei ein ganzheitliches Sicherheitsverst\u00e4ndnis schon in der Planung, denn w\u00e4hrend etwa die Incident Response eine m\u00f6glichst schnelle Wiederherstellung arbeitsf\u00e4higer Systeme anstrebt, ben\u00f6tigt die Forensik Zeit, Spuren zu sichern.<\/p>\n<p>Viel Spass beim lesen<\/p>\n<p>Matthias Walter, <a title=\"http:\/\/www.tec4net.com\" href=\"http:\/\/www.tec4net.com\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.tec4net.com<\/a><br \/>\nEDV-Sachverst\u00e4ndiger und Datenschutzauditor<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Systemeinbr\u00fcche erkennen, ermitteln, aufkl\u00e4ren dpunkt-Verlag &#8211; ISBN-10: 3898645347 Computer-Forensik ist das Bindeglied zwischen der Incident Response, der Bew\u00e4ltigung der Folgen und Sch\u00e4den eines Vorfalls oder Angriffs, und einer erfolgreichen Strafverfolgung\/eines Schadensersatzes: wie waren\/sind die technischen Vorg\u00e4nge, welche Form von Straftat liegt vor, warum konnte es passieren &#8212; Aufkl\u00e4rung, Feststellung und [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1360,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Computer-Forensik - Alexander Geschonneck - IT-NEWS-BLOG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/it-news-blog.com\/?p=171\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer-Forensik - Alexander Geschonneck - IT-NEWS-BLOG\" \/>\n<meta property=\"og:description\" content=\"Systemeinbr\u00fcche erkennen, ermitteln, aufkl\u00e4ren dpunkt-Verlag &#8211; ISBN-10: 3898645347 Computer-Forensik ist das Bindeglied zwischen der Incident Response, der Bew\u00e4ltigung der Folgen und Sch\u00e4den eines Vorfalls oder Angriffs, und einer erfolgreichen Strafverfolgung\/eines Schadensersatzes: wie waren\/sind die technischen Vorg\u00e4nge, welche Form von Straftat liegt vor, warum konnte es passieren &#8212; Aufkl\u00e4rung, Feststellung und [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/it-news-blog.com\/?p=171\" \/>\n<meta property=\"og:site_name\" content=\"IT-NEWS-BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2011-01-19T22:05:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-15T17:26:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/it-news-blog.com\/wp-content\/uploads\/2011\/01\/tec4net_help.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthias Walter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthias Walter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/it-news-blog.com\/?p=171\",\"url\":\"https:\/\/it-news-blog.com\/?p=171\",\"name\":\"Computer-Forensik - Alexander Geschonneck - IT-NEWS-BLOG\",\"isPartOf\":{\"@id\":\"https:\/\/it-news-blog.com\/#website\"},\"datePublished\":\"2011-01-19T22:05:54+00:00\",\"dateModified\":\"2019-04-15T17:26:31+00:00\",\"author\":{\"@id\":\"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc\"},\"breadcrumb\":{\"@id\":\"https:\/\/it-news-blog.com\/?p=171#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/it-news-blog.com\/?p=171\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/it-news-blog.com\/?p=171#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/it-news-blog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer-Forensik &#8211; Alexander Geschonneck\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/it-news-blog.com\/#website\",\"url\":\"https:\/\/it-news-blog.com\/\",\"name\":\"IT-NEWS-BLOG\",\"description\":\"Ein Service der tec4net GmbH\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/it-news-blog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc\",\"name\":\"Matthias Walter\",\"sameAs\":[\"https:\/\/tec4net.com\"],\"url\":\"https:\/\/it-news-blog.com\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer-Forensik - Alexander Geschonneck - IT-NEWS-BLOG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/it-news-blog.com\/?p=171","og_locale":"de_DE","og_type":"article","og_title":"Computer-Forensik - Alexander Geschonneck - IT-NEWS-BLOG","og_description":"Systemeinbr\u00fcche erkennen, ermitteln, aufkl\u00e4ren dpunkt-Verlag &#8211; ISBN-10: 3898645347 Computer-Forensik ist das Bindeglied zwischen der Incident Response, der Bew\u00e4ltigung der Folgen und Sch\u00e4den eines Vorfalls oder Angriffs, und einer erfolgreichen Strafverfolgung\/eines Schadensersatzes: wie waren\/sind die technischen Vorg\u00e4nge, welche Form von Straftat liegt vor, warum konnte es passieren &#8212; Aufkl\u00e4rung, Feststellung und [&hellip;]","og_url":"https:\/\/it-news-blog.com\/?p=171","og_site_name":"IT-NEWS-BLOG","article_published_time":"2011-01-19T22:05:54+00:00","article_modified_time":"2019-04-15T17:26:31+00:00","og_image":[{"width":960,"height":400,"url":"https:\/\/it-news-blog.com\/wp-content\/uploads\/2011\/01\/tec4net_help.jpg","type":"image\/jpeg"}],"author":"Matthias Walter","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Matthias Walter","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/it-news-blog.com\/?p=171","url":"https:\/\/it-news-blog.com\/?p=171","name":"Computer-Forensik - Alexander Geschonneck - IT-NEWS-BLOG","isPartOf":{"@id":"https:\/\/it-news-blog.com\/#website"},"datePublished":"2011-01-19T22:05:54+00:00","dateModified":"2019-04-15T17:26:31+00:00","author":{"@id":"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc"},"breadcrumb":{"@id":"https:\/\/it-news-blog.com\/?p=171#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/it-news-blog.com\/?p=171"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/it-news-blog.com\/?p=171#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/it-news-blog.com\/"},{"@type":"ListItem","position":2,"name":"Computer-Forensik &#8211; Alexander Geschonneck"}]},{"@type":"WebSite","@id":"https:\/\/it-news-blog.com\/#website","url":"https:\/\/it-news-blog.com\/","name":"IT-NEWS-BLOG","description":"Ein Service der tec4net GmbH","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/it-news-blog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc","name":"Matthias Walter","sameAs":["https:\/\/tec4net.com"],"url":"https:\/\/it-news-blog.com\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/171"}],"collection":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=171"}],"version-history":[{"count":3,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/171\/revisions"}],"predecessor-version":[{"id":1361,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/171\/revisions\/1361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/media\/1360"}],"wp:attachment":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}