Professional Documents
Culture Documents
LEA need to access data from remote location 3)Scenarios... Servers... Encryption... Incident response... 4)Cyber forensics and Incident response Offline Online 5)Challenges 1.depoying a tool. cause minimal changes to the system 2.read only. 3.performances 4.Security. 6)Existing technology OFC,SCSI,iscsi 7)iscsi... 8)Designed ... .. .. 9)Current status feasible read only method... 10)future works Security extend to platforms physical Memory, stealth mode..