Computer imaging is the process of duplicating the data of an entire hard drive. Imaging has many uses. For example, many network and systems administrators use imaging to deploy a consistent operating system installation across a series of computer with the same hardware. This saves the administrator time and effort by not having to load each computer by hand.
However, in the realm of computer forensics, disk imaging is used to make an exact copy of a drive so to not “tamper” or “damage” the original evidence.
In computer forensics what are the steps to creating an image of a disk?
What security checks should be performed to ensure an exact copy is made?
What are some reasons disk imaging is useful in computer forensics?
Solution:
The steps to creating an image of a disk
Security checks should be performed to ensure an exact copy is made:
Reasons disk imaging is useful in computer forensics
Computer imaging is the process of duplicating the data of an entire hard drive. Imaging has...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...