Professional Documents
Culture Documents
Te
gusta
esta
unidad
de Crea una cuenta
estudio? gratis
Crea una
cuenta Ms tarde
gratis para
poder
guardarla.
worm does not infect host files, stands alone in own file,
propagates itself with no human intervention, exploits
vulnerabilities in protocols, networks, and configurations,
can get into email lists, compose email, attach
themselves, does not need to have malicious payload
common location of IDS, IPS, firewall logs, application logs, server logs, http
network data captures, ftp captures, email
hash functions positively verify that files or drives have not been
altered, verify that files and drives and any copies are
intact and have not changed during the investigation
slack space location of the end of a file on a hard drive to the end of
the file cluster that the file is stored in, can find deleted
files, or fragments of deleted files and hidden data
items that need to be manufacturer, model, serial # of hard drives and system
documented components, peripherals attached tro the system, a
description of the evidence, case number, item tag
number of evidence, hash algorithms and message
digests of digital evidence, date and time of collection,
full name and signature of people possessing the
evidence, location of the evidence, all receipts and
transfers