X hits on this document

Powerpoint document

Cyber Security - the Laws that Govern Incident Response - page 13 / 38

103 views

0 shares

0 downloads

0 comments

13 / 38

2h. Tracing Traffic Data During an Incident; The Tools

Part II. Tracing Source/Destination of Communications

Pen/Trap

The Pen Register, Trap and Trace Statute governs real-time monitoring of traffic data (e.g. most e-mail header information, source and destination IP address and port)

Pen Register: outgoing connection data

Trap and Trace: incoming connection data

Does not include content of communications (e.g. e-mail subject line or content of a downloaded file).

If law enforcement wishes to get a court order – the burden of proof is lower than for reading content

Document info
Document views103
Page views103
Page last viewedWed Dec 07 19:46:50 UTC 2016
Pages38
Paragraphs396
Words2817

Comments