Index

Note: Page numbers followed by “f” and “t” refer to figures and tables, respectively.

A

Acceptable use policy (AUP), 71, 200
AccessData Boot Camp, 119
AccessData training class, 119
Accountability, defined, 8
Adware, defined, 8
Antivirus software, 27, 63
Artifact, defined, 8
ASCII-based data, 102
Association of Certified E-Discovery Specialists (ACEDS), 117
Attack cycle, defined, 8
Attacker, defined, 8
Attacker’s identity, 94–95
Attribution, defined, 8
Audit logs, 51
Authenticity, defined, 8
Availability, defined, 8

B

Backups, 63
BlackLight, 163
Botnet, defined, 8
Bring your own device (BYOD), 203–204
Buffering, 181–183
Business impact analysis, 202–203
Business impact assessments, 66

C

Canadian government, 86–88
incident handling, 86–88 ...

Get Computer Incident Response and Forensics Team Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.