O'Reilly logo

Computer Evidence: Collection and Preservation, Second Edition by Christopher L. T. Brown

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

  • Supporting evidence and information can be gained through grassroots investigative techniques.

  • Expanding computer forensics investigative techniques helps mitigate the “hacker did it” defense.

  • Computer forensics investigators who are interviewing subjects may need to be licensed as private investigators, depending on the state.

  • The Reid Technique focuses on preparing for the interview and employing nine steps in the interview process.

  • Users should be represented on IT security policy review teams.

  • Policy review should support goals of preservation, authentication, and extraction of data for evidence.

  • One common issue relating to data retention and employee turnover is that often the misconduct of the terminated employee is not discovered until ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required