O'Reilly logo

Computer Evidence: Collection and Preservation, Second Edition by Christopher L. T. Brown

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

  • Forensics workstations should not be directly connected to the Internet.

  • By simply separating the operational forensics network from an administrative network that is connected to the Internet, WAN, or other partner networks, risks can be mitigated.

  • When a network is being designed from the top-down, engineers should first analyze their business goals and constraints and follow up by taking a close look at their technical goals and constraints.

  • Investigators should consider how many users and how much traffic the lab’s network should be capable of handling. Performance should gain much attention due to the large volumes of data that can be expected in the computer forensics field. Rarely does a normal administrative network need to handle ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required