In this chapter you will learn about various response procedures and methods for appropriately dealing with incidents. You will gain an understanding of computer forensics, the incident response model, along with how to procure evidence. This chapter will also provide you with the opportunity to learn about specific laws which guide the policies and procedures to ensure compliance.
- 1.
Apply appropriate incident response procedures.
- 2.
Identify the various laws that affect cybersecurity.
Computer Forensics
Computer ...