* Incident response and forensic investigation are the processes of detecting attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks * This much-needed reference covers the methodologies for incident response and computer forensics, Federal Computer Crime law information and evidence requirements, legal issues, and working with law enforcement * Details how to detect, collect, and eradicate breaches in e-mail and malicious code * CD-ROM is packed with useful tools that help capture and protect forensic data; search volumes, drives, and servers for evidence; and rebuild systems quickly after evidence has been obtainedComputer Forensics Toolkit Douglas Schweitzer. Policy. Audit. Checklist. a. Sample. The following checklist addresses ways to customize a security policy to your organizationa#39;s specific ... Are outsiders (for example, repair technicians and outside organizations) required to sign a contract acknowledging that they are awareanbsp;...
|Publisher||:||Wiley - 2003-05-02|