After reading this chapter and completing the exercises, you will be able to do the following:
Understand basic forensics principles
Make a forensic copy of a drive
Use basic forensics tools
In the preceding 13 chapters, you have been introduced to a variety of security topics: from concepts like the CIA triangle, to attacks such as session hijacking, to counter measures like ...