One of the key points when conducting digital forensics is to ensure that any relevant evidence that is gathered is able to be used in court if necessary. What is this concept called?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |