O'Reilly logo

Mac® Security Bible by Joe Kissell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

24.6. Summary

If, despite all your efforts at prevention, your Mac has been the victim of some sort of attack—malware, unauthorized network access, data theft, or whatever—learning exactly what happened and why can help you to prevent similar problems in the future (and, in some cases, identify the source of the attack, which may be especially crucial information if a crime has been committed). This chapter provided a brief overview of computer forensics, including a discussion of how to identify illicit processes and applications, how to tell what programs are communicating with whom over the Internet, and analyzing a potentially compromised Mac using MacForensicsLab or other tools.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required