- Digital Forensics and Incident Response
- Gerard Johansen
- 129字
- 2021-07-02 18:49:46
Preservation
Once evidence is identified, it is important to safeguard it from any type of modification or deletion. For evidence such as log files, it may become necessary to enable controls that protect log files from removal or modification. In terms of host systems such as desktops, it may become necessary to isolate the system from the rest of the network through either physical or logical controls, network access controls or perimeter controls. It is also critical that any users not be allowed to access a suspect system. This ensures that users do not deliberately or inadvertently taint the evidence. Another facet of preservation measures has been the increased reliance on virtual platforms. Preservation of these systems can be achieved through the snapshotting systems and saving to non-volatile storage.
- UI設計基礎培訓教程
- PowerCLI Cookbook
- Apache Spark 2 for Beginners
- PyTorch Artificial Intelligence Fundamentals
- 深入淺出Android Jetpack
- Julia Cookbook
- Learning JavaScript Data Structures and Algorithms
- Python Web數據分析可視化:基于Django框架的開發實戰
- Apache Kafka Quick Start Guide
- RSpec Essentials
- 區塊鏈國產化實踐指南:基于Fabric 2.0
- Scrapy網絡爬蟲實戰
- Tableau Dashboard Cookbook
- 面向對象程序設計及C++(第3版)
- Python編程入門(第3版)