X hits on this document

Powerpoint document

Security+ Guide to Network Security Fundamentals, Third Edition - page 56 / 60

252 views

0 shares

0 downloads

0 comments

56 / 60

Security+ Guide to Network Security Fundamentals, Third Edition

Responding to a Computer Forensics Incident (continued)

Preserve the evidence

Team should first capture any volatile data

The team should next focus on the hard drive

Mirror image backups replicate all sectors of a computer hard drive, including all files and any hidden data storage areas

Chain of custody

Documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence

Document info
Document views252
Page views252
Page last viewedTue Jan 24 19:28:23 UTC 2017
Pages60
Paragraphs499
Words2429

Comments