7. Digital Forensics

learn this if you don’t want to get caught

Steps in Digital Forensics
Evidences identification
Irregularity in log files
Firewall reported attack
Capture Evidences
Capture Techniques
Disconnect from Internet
Isolate attacked machine
Evidence Analysis
Log Analysis

Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
) instead.