X hits on this document

Powerpoint document

Security+ Guide to Network Security Fundamentals, Third Edition - page 57 / 60

149 views

0 shares

0 downloads

0 comments

57 / 60

Security+ Guide to Network Security Fundamentals, Third Edition

Responding to a Computer Forensics Incident (continued)

Examine for evidence

After a computer forensics expert creates a mirror image of a system:

Original system is secured

Mirror image is examined to reveal evidence

Includes searching word processing documents, e-mail files, spreadsheets, and other documents for evidence

Hidden clues can also be mined and exposed

Including the Windows page file

Another source of hidden data is called slack

Document info
Document views149
Page views149
Page last viewedSun Dec 04 10:37:06 UTC 2016
Pages60
Paragraphs499
Words2429

Comments