Chapter 7

Endpoint Forensics

“Man is still the most extraordinary computer of all.”

—John F. Kennedy

In this chapter, we cover the basics of endpoint system forensics. This, of course, could mean a number of things because there are so many different types of endpoints connected to our networks today. In fact, the numbers in Figure 7-1 show just how many devices are connected and what the projected growth rate is for devices to obtain Internet capabilities. Notice the capital B for billion! From a security standpoint, dealing with all these endpoints is a big challenge. Not too long ago, everyone had a big box under their desk and a big CRT monitorthe standard desktop computer. Today, most people carry at least three devices that are connected ...

Get Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, First Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.