From the course: CISSP Cert Prep (2021): 7 Security Operations
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
System and file forensics
From the course: CISSP Cert Prep (2021): 7 Security Operations
System and file forensics
- [Narrator] Digital evidence often comes from computers, mobile devices and digital media that store information required by investigators. That's where Forensic Investigators use system and file forensic techniques to collect and preserve their digital evidence. Now remember, the first rule of evidence collection is that investigators must never take any action that alters the evidence itself and may lead to misinterpretation. When it comes to systems and files, Forensic Investigators preserve this principle by never working with the actual physical evidence, unless absolutely necessary. They do this by creating copies or images of the physical evidence and then using those images for forensic analysis. When a forensic analyst creates an image of a hard drive or other media, they must connect the device to the drive and then use that device to copy off the data stored on the drive. Whenever a drive is connected to a…
Contents
-
-
-
Conducting investigations3m 50s
-
(Locked)
Evidence types3m 28s
-
(Locked)
Introduction to forensics3m 21s
-
(Locked)
System and file forensics4m 26s
-
(Locked)
Network forensics4m 1s
-
(Locked)
Software forensics4m 25s
-
(Locked)
Mobile device forensics1m 10s
-
(Locked)
Embedded device forensics2m 30s
-
(Locked)
Chain of custody1m 50s
-
(Locked)
Reporting and documenting incidents3m 58s
-
(Locked)
Electronic discovery (ediscovery)3m 3s
-
-
-
-
-
-
-
-