X hits on this document

Powerpoint document

Security+ Guide to Network Security Fundamentals, Third Edition - page 56 / 60

164 views

0 shares

0 downloads

0 comments

56 / 60

Security+ Guide to Network Security Fundamentals, Third Edition

Responding to a Computer Forensics Incident (continued)

Preserve the evidence

Team should first capture any volatile data

The team should next focus on the hard drive

Mirror image backups replicate all sectors of a computer hard drive, including all files and any hidden data storage areas

Chain of custody

Documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence

Document info
Document views164
Page views164
Page last viewedTue Dec 06 21:57:30 UTC 2016
Pages60
Paragraphs499
Words2429

Comments