Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
306 ◾  Information Security Management Handbook
Imaging is a term that means to copy all allocated and unallocated parts of storage. Solomon,
Barett, and Broom, three authorities on digital forensics, also refer to the image as a forensic
duplicate. e forensic duplicate starts at byte zero and goes to the last byte of the storage device.
e duplicate or image contains parts of files, parts of sessions, and many pieces of important
forensic evidence that can help the CCE get a clearer understanding of the case and create a
report. An image is different than a backup because a backup only includes files that are pres-
ently listed in the file allocation table. A backup does not include existing files that were marked
for deletion.
Many law offices t ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498