24.6. Summary

If, despite all your efforts at prevention, your Mac has been the victim of some sort of attack—malware, unauthorized network access, data theft, or whatever—learning exactly what happened and why can help you to prevent similar problems in the future (and, in some cases, identify the source of the attack, which may be especially crucial information if a crime has been committed). This chapter provided a brief overview of computer forensics, including a discussion of how to identify illicit processes and applications, how to tell what programs are communicating with whom over the Internet, and analyzing a potentially compromised Mac using MacForensicsLab or other tools.

Get Mac® Security Bible now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.