The application of science to the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data.
National Institute of Standards and Technology. (2006). Guide to integrating forensic techniques into incident response. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf
computer crimes, computer hackers, computer networks--decurity measures, computer security, cryptography, data protection, electronic discovery (law), electronics in criminal investigation, forensic sciences--data processing, hacking (computer security)
Knowledge Base search a series of commonly asked questions by topic keyword or course number
Telephone a librarian at 800-293-3044
IT Help Desk: 877-306-4283