O'Reilly logo

Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, First Edition by Aamir Lakhani, Joseph Muniz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Endpoint Forensics

“Man is still the most extraordinary computer of all.”

—John F. Kennedy

In this chapter, we cover the basics of endpoint system forensics. This, of course, could mean a number of things because there are so many different types of endpoints connected to our networks today. In fact, the numbers in Figure 7-1 show just how many devices are connected and what the projected growth rate is for devices to obtain Internet capabilities. Notice the capital B for billion! From a security standpoint, dealing with all these endpoints is a big challenge. Not too long ago, everyone had a big box under their desk and a big CRT monitorthe standard desktop computer. Today, most people carry at least three devices that are connected ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required