image
INDEX
image
A
Acceptable Use Policy (AUP), 48
access control
applications, 563
live response collection, 143–144
methods for, 557–558
networks, 69–74
servers, 563
access control lists (ACLs), 6, 571
Access Data FTK. See FTK
access logs, 65–66
AccessData FTK Imager, 171, 172, 178–179
AccessData FTK Imager Lite, 152–154, 178–179
accounts. See user accounts
ACH (automated clearing house) scenario, 127–130, 530–532
ACLs (access control lists), 6, 531, 571
ad-hoc monitoring, 56–57
administrators
authentication, 569
disabling, 566
identifying, 87
passwords, ...

Get Incident Response & Computer Forensics, Third Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.