O'Reilly logo

Computer Evidence: Collection and Preservation, Second Edition by Christopher L. T. Brown

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

  • Because each computer forensics collection operation can vary so greatly, investigators need to have a playbook to operate from.

  • One of the difficulties when attempting to create boilerplates is to make them general enough to be useful in an array of situations but detailed enough to be helpful.

  • An investigator’s playbook may include black bag inventories and forms.

  • In certain situations, even tools that were created with the computer forensics process in mind may be somewhat destructive.

  • Three leading manufacturers of disk-imaging and write-blocking tools are MyKey Technology [Mykey01], Intelligent Computer Solutions (ICS) [Ics01], and Logicube [Logicube01].

  • Software used for the collection and preservation of computer evidence usually falls ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required