STORING FILES |
CHAPTER 5 |
ABOUT THIS CHAPTER
In this chapter, we begin by addressing the aftermath of a security incident and follow this to the problem of file storage. Specifically, we examine the following:
• Incident response and recovering from an attack
• Fundamentals of evidence collection and preservation
• Basics of hard drives and other large-capacity devices
• Hard drive formatting
• File storage on hard drives, flash drives, and other devices
• Features of major file systems used in operating systems and for removable storage
5.1 Incident Response and Attack
After the Trojan horse incident in Section 4.4.3, Bob decided to store working files on small, removable USB flash drives. At first he used the first drives he ...
Get Elementary Information Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.