Download now Free registration required
Security breaches leading to the compromise of sensitive information have become a very real concern for organizations in a number of industries worldwide. When it comes to investigating these compromises, successfully determining the source and full extent of the breach in a manner sufficient for prosecution is often predicated on whether or not basic evidentiary guidelines are adhered to. In fact, one of the greatest obstacles faced by qualified forensic examiners today involves logical and physical changes to digital evidence, specifically those changes occurring before the start of the investigation.
- Format: PDF
- Size: 133.3 KB