Certified Cybersecurity Technician Computer Forensics PDF
Document Details
Uploaded by barrejamesteacher
null
Tags
Related
- Certified Cybersecurity Technician Computer Forensics PDF
- Certified Cybersecurity Technician Computer Forensics PDF Exam 212-82
- Computer Forensics - Certified Cybersecurity Technician - Exam 212-82 PDF
- Chapter 20 - 05: Cybersecurity Forensic Investigation Phases - PDF
- Computer Forensics Exam 212-82 PDF
- Computer Forensics Fundamentals PDF
Summary
This document provides a guide to different sources of potential evidence used in cybersecurity and computer forensics investigations, including user-created files, user-protected files, and computer-created files. It also covers locations of potential digital evidence.
Full Transcript
Certified Cybersecurity Technician Exam 212-82 Computer Forensics Sources of Potential Evidence...
Certified Cybersecurity Technician Exam 212-82 Computer Forensics Sources of Potential Evidence Computer-Created User-Created Files User-Protected Files Files == Address books Address books -= Compressed cOmpressed files files =. Backup files Backup files = Database files. )! * Log Log files = Misnamed Misnamed files = Media (images, graphics, = Configuration files audio, video, etc.) files = Encrypted files * Encrypted files = Printer spool files *= Documents (text, = Password-protected files = Cookies spreadsheet, presentation, etc.) files =® Swap files *= Hidden Hidd en files files Swapflles =* Internet bookmarks, = System files favorites, etc. = Steganography Steganography = History files Temporary files Sources of Potential Evidence (Cont’d) Bt oo "text/" href="my:c - 1/ Hard Drive Text, picture, video, multimedia, database, and computer program files