Chapter 13
Computer Intrusions
Eoghan Casey and Christopher Daywalt
Contents
How Computer Intruders Operate
Investigating Computer Intrusions
Forensic Preservation of Volatile Data
Post-Mortem Investigation of a Compromised System
… the safecracker has been portrayed as a masked, bewhiskered, burly individual whose daring was matched only by his ruthlessness in disposing of interference. This legend undoubtedly had its origin in the facility with which the safecracker could be caricatured by cartoonists. His safe, mask, blackjack, and flashlight have come to be the picturesque symbols of the professional criminal. By this intimate association, the safe burglar has acquired ...
Get Digital Evidence and Computer Crime, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.