12.07.2015 Views

What is new in CHFI v8 Module - SSE

What is new in CHFI v8 Module - SSE

What is new in CHFI v8 Module - SSE

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Computer Forensic InvestigatorComputer hack<strong>in</strong>g forensic <strong>in</strong>vestigation <strong>is</strong> theprocess of detect<strong>in</strong>g hack<strong>in</strong>g attacks and properlyextract<strong>in</strong>g evidence to report the crime and conductaudits to prevent future attacksComputer forensics <strong>is</strong> simply the application ofcomputer <strong>in</strong>vestigation and analys<strong>is</strong> techniques <strong>in</strong> the<strong>in</strong>terests of determ<strong>in</strong><strong>in</strong>g potential legal evidence<strong>CHFI</strong> <strong>in</strong>vestigators can draw on an array of methodsfor d<strong>is</strong>cover<strong>in</strong>g data that resides <strong>in</strong> a computersystem, or recover<strong>in</strong>g deleted, encrypted,or damaged file <strong>in</strong>formation20Copyright © by EC-CouncilAll Rights Reserved. Reproduction <strong>is</strong> Strictly Prohibited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!