Computer Crime Evidence-preservation Checklist
June 30, 2011, 12:00am PDT
Source: TechRepublic Pro
You've detected a computer crime and decided to report that activity to law enforcement. But before you touch the affected machine, open a single event log, or run another program, you must secure all digital evidence.
TechRepublic's Computer Crime Evidence-preservation Checklist tells you what to do and what not to do in the aftermath of a computer crime.
Note: This checklist is an updated version of our Cybercrime evidence-protection checklist.File Size: 270 KB