In this chapter you will learn about
• Computer forensics
• Three phases of a computer forensic investigation
• The importance of protecting evidence
• How to protect volatile RAM and data on disk drives
• The difference between computer abuse and computer crime
• How mandatory vacations and job rotation help prevent fraud
• Some of the laws designed to protect PII
52.14.240.178