|
In this chapter, you learned about the fundamentals of disaster recovery, as well as how that process is affected by computer forensics. The most important lesson from this chapter is that every organization must intertwine forensic evidence gathering with its business continuity, disaster recovery, and incident response policies. As soon as an incident is contained, and before a vulnerability is eradicated, it is important to preserve the evidence. This evidence will be useful in gaining a better understanding of the causes of the incident, thus leading to better planning to avoid similar incidents in the future, and may be used, as needed, in the prosecution of the offenders.
|