Skip to Main Content
Cyber Forensics, 2nd Edition
book

Cyber Forensics, 2nd Edition

by Albert Marcella Jr., Doug Menendez
December 2010
Intermediate to advanced content levelIntermediate to advanced
528 pages
18h 51m
English
Auerbach Publications
Content preview from Cyber Forensics, 2nd Edition
Performing a Cyber Forensic Investigation: Flowchart for the Seizure 213
Table 7.5 (continued)
C. Notify the antivirus team.
1. If the organization currently has an antivirus team in place, report any virus
activity to the antivirus team and the IRT.
D. Verify the incident.
1. Upon learning of a possible security incident, take steps to verify that the incident
actually does exist.
2. If the source of the incident information is unfamiliar or not trusted, verify the
source, especially if the source has identified him or herself as a representative
of a legal or investigative agency.
3. Verify the incident, fi rsthand if possible, to ensure that ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Digital Forensics and Incident Response - Second Edition

Digital Forensics and Incident Response - Second Edition

Gerard Johansen
Digital Forensics

Digital Forensics

John Sammons
Cyber Security and Digital Forensics

Cyber Security and Digital Forensics

Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le

Publisher Resources

ISBN: 9781439848234