Control evidence - Maintain integrity - Incident response: Chain of custody, Identify the issue Report to proper channels Collect and protect information  - Incident response: First response, Copy the contents of a disk Remove the physical drive Use a hardware write-blocker Software imaging tools  - Incident response: Copy of drive, Document the findings - Incident response: Documentation, Most software includes a license Terms and conditions Valid licenses Non-expired licenses Ongoing Subscriptions - Software licenses,  Designed for the home user Usually associated with a single device - Personal license, Per-seat purchase / Site license The software may be installed everywhere Annual renewals  - Corporate use license, Free and Open Source (FOSS) Source code is freely available Closed source / Commercial - Open source license, Payment Card Industry Data Security Standard (PCI DSS) Six control objectives - Regulating credit card data,

a+1102 4.6 - Privacy, Licensing, and Policies

排行榜

视觉风格

选项

切换模板

恢复自动保存: