After reading this chapter and completing the exercises, you will be able to do the following:
Understand basic forensics principles.
Make a forensic copy of a drive.
Use basic forensics tools.
Throughout this book we have explored network security. We have examined threats and countermeasures, firewalls, anti-virus, IDS, cyberterrorism, policies, and more. However, your network ...