Conclusion

Due to the pervasive nature of Windows operating systems and applications, Windows systems are subject to attack and compromise on an increasingly regular basis. The means of attack can consist of malicious web sites targeting web browser vulnerabilities, malicious email attachments, automated worms exploiting known (and long-since patched) vulnerabilities, or an individual's direct, manual attempts to exploit known vulnerabilities. The purpose of this book is to provide administrators and investigators with the knowledge they need in order to efficiently handle incidents when they do occur.

Get Windows Forensics and Incident Recovery now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.