Speaker: Sandro Melo & Nelson Uto
In past, a server configured their risks but these risks were physically dimensioned, corresponding to the limits of the LAN of the corporation or institution. The Internet has radically changed this scenario.
I t is more secure than a system with Firewall or other security devices, there will always be the possibility of human error or hitherto unknown failure in the operating system or applications, whether proprietary or FOSS system. Given this degree of risk, at first intangible, the threat of an invasion is something that we can't overlook.
In this context, the forensic techniques are essential during the response to an incident, to identify where the computer has violated its security, which was changed, the identity of the attacker and preparing the environment for expertise of Forensic Computer.
Bearing in mind the care of an expert as a Computer Forensic invasion is electronic crime. A digital evidence must be preserved so that it can have value.