STORING FILES

CHAPTER

5

ABOUT THIS CHAPTER

In this chapter, we begin by addressing the aftermath of a security incident and follow this to the problem of file storage. Specifically, we examine the following:

  Incident response and recovering from an attack

  Fundamentals of evidence collection and preservation

  Basics of hard drives and other large-capacity devices

  Hard drive formatting

  File storage on hard drives, flash drives, and other devices

  Features of major file systems used in operating systems and for removable storage

5.1     Incident Response and Attack

After the Trojan horse incident in Section 4.4.3, Bob decided to store working files on small, removable USB flash drives. At first he used the first drives he ...

Get Elementary Information Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.