- Digital Forensics and Incident Response
- Gerard Johansen
- 129字
- 2021-07-02 18:49:46
Preservation
Once evidence is identified, it is important to safeguard it from any type of modification or deletion. For evidence such as log files, it may become necessary to enable controls that protect log files from removal or modification. In terms of host systems such as desktops, it may become necessary to isolate the system from the rest of the network through either physical or logical controls, network access controls or perimeter controls. It is also critical that any users not be allowed to access a suspect system. This ensures that users do not deliberately or inadvertently taint the evidence. Another facet of preservation measures has been the increased reliance on virtual platforms. Preservation of these systems can be achieved through the snapshotting systems and saving to non-volatile storage.
- Python自然語言處理實戰:核心技術與算法
- The Android Game Developer's Handbook
- Mastering OpenCV Android Application Programming
- 跟“龍哥”學C語言編程
- Mastering Ember.js
- Scala Design Patterns
- Access 2010數據庫應用技術(第2版)
- 玩轉.NET Micro Framework移植:基于STM32F10x處理器
- 石墨烯改性塑料
- 奔跑吧 Linux內核
- Java程序設計教程
- Java從入門到精通(視頻實戰版)
- Mastering ArcGIS Server Development with JavaScript
- 現代C++語言核心特性解析
- Distributed Computing with Python