forensic information

CISSP Server-Based Systems – Bk1D3T5St2

In this section we shall consider the security related to server-based systems other than web servers (which are covered below in the “Assess and Mitigate Vulnerabilities in Web- Based Systems” section). Server vulnerabilities mirror many of the same vulnerabilities described above, just from the server’s perspective. The server needs to validate the identity of the client and/or the identity of the user of the client. This can be done using a combination of Identity and …

CISSP Server-Based Systems – Bk1D3T5St2 Read More »

an-overview-of-knowledge-acquisition

An Overview of knowledge Acquisition

Knowledge Acquisition An Overview of knowledge Acquisition is that the initial pro-active step within the forensic investigation method. The aim of forensic information acquisition is to extract as of knowledge gift on the victim’s fixed disk and build a forensic copy to use it as proof within the court. In some cases, information duplication is preferred rather than information acquisition to gather the information. 1st investigators can even gift the duplicated data in court.This section …

An Overview of knowledge Acquisition Read More »