are very significant depending on the case. However, this paper give precedence to data sources used to acquire evidence for network intrusions, malware installations, and insider file deletions. These three events direct the arrangement to the analyzing of data presented. In addition, the paper also covers what communication is preferred, and the practicality of that data. Primary emphasis is data brought together from sources such as Live System Data, Intrusion Detection System, Network Intrusion…
Words 1181 - Pages 5