Certified Cybersecurity Technician Computer Forensics PDF

Summary

This document provides a guide to different sources of potential evidence used in cybersecurity and computer forensics investigations, including user-created files, user-protected files, and computer-created files. It also covers locations of potential digital evidence.

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Computer Forensics Sources of Potential Evidence...

Certified Cybersecurity Technician Exam 212-82 Computer Forensics Sources of Potential Evidence Computer-Created User-Created Files User-Protected Files Files == Address books Address books -= Compressed cOmpressed files files =. Backup files Backup files = Database files. )! * Log Log files = Misnamed Misnamed files = Media (images, graphics, = Configuration files audio, video, etc.) files = Encrypted files * Encrypted files = Printer spool files *= Documents (text, = Password-protected files = Cookies spreadsheet, presentation, etc.) files =® Swap files *= Hidden Hidd en files files Swapflles =* Internet bookmarks, = System files favorites, etc. = Steganography Steganography = History files Temporary files Sources of Potential Evidence (Cont’d) Bt oo "text/" href="my:c - 1/ Hard Drive Text, picture, video, multimedia, database, and computer program files

Use Quizgecko on...
Browser
Browser