Bibliography

Agrawal A, Gupta M, Gupta S, Gupta S.C. Systematic digital forensic investigation model. International Journal of Computer Science and Security (IJCSS). 2011;5 (1).

Ahmad A. The Forensic Chain-of-Evidence Model: Improving the Process of Evidence Collection in Incident Handling Procedures. 2002. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.8677.

American Bar Association. E-Discovery and electronic evidence in the courtroom. Business Law Today. September/October 2007;17(1). https://apps.americanbar.org/buslaw/blt/2007-09-10/chorvat.shtml.

Association of Chief Police Officers. Good Practice Guide for Computer-Based Electronic Evidence. 2007. http://www.7safe.com/electronic_evidence/ACPO_guidelines_computer_evidence.pdf.

Australian Government – Civil Aviation Safety Authority. Cost Benefit Analysis Methodology Procedures Manual. 2007. http://www.casa.gov.au/scripts/257r005.pdf.

Australian Signal Directorate. Strategies to Mitigate Targeted Cyber Intrusions. Australian Government - Department of Defense; 2014. http://www.asd.gov.au/infosec/mitigationstrategies.htm.

Bahadur P. Difference between Guideline, Procedure, Standard and Policy. 2014. http://www.hrsuccessguide.com/2014/01/Guideline-Procedure-Standard-Policy.html.

Baryamureeba V, Tushabe F. The Enhanced Digital Investigation Process Model. Kampala Uganda: Institute of Computer Science, Makerere University; 2004. http://dfrws.org/2004/day1/Tushabe_EIDIP.pdf.

Beebe N.L, Clark J.G. A Hierarchical, Objectives-Based Framework for the Digital Investigations Process. Digital Forensics Research Workshop (DFRWS); 2004. http://www.dfrws.org/2004/day1/Beebe_Obj_Framework_for_DI.pdf.

Bem D, Huebner E. Computer forensic analysis in a virtual environment. International Journal of Digital Evidence. Fall 2007;6(2). https://www.utica.edu/academic/institutes/ecii/publications/articles/1C349F35-C73B-DB8A-926F9F46623A1842.pdf.

Bennett B.T. Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel. John Wiley & Sons; 2007: 9780471771524.

Bragg R. CISSP Training Guide. Pearson IT Certification; 2002: 978-0-7897-2801-2.

Bretherton F.P, Singley P.T. Metadata: A User’s View. IEEE; 1994: 0-8186-6610-2.

Brunty J. Validation of Forensic Tools and Software: A Quick Guide for the Digital Forensic Examiner. 2011. http://www.forensicmag.com/articles/2011/03/validation-forensic-tools-and-software-quick-guide-digital-forensic-examiner.

Canadian Government – Treasury Board of Canada Secretariat. Canadian Cost-Benefit Analysis Guide: Regulatory Proposals. 20079780662050391. http://www.tbs-sct.gc.ca/rtrap-parfa/analys/analys-eng.pdf.

Carrier B.D, Spafford E.H. Getting physical with the digital investigation process. International Journal of Digital Evidence. 2003;2 (2).

Carrier B.D, Spafford E.H. An Event-Based Digital Forensic Investigation Framework. Digital Forensics Research Workshop (DFRWS); 2004. http://www.digital-evidence.org/papers/dfrws_event.pdf.

Casey E. Digital Evidence and Computer Crime – Forensic Science, Computers and the Internet. San Diego: Academic Press; 2000.

Casey E. Digital Evidence and Computer Crime – Forensic Science, Computers and the Internet. third ed. San Diego: Academic Press; 2011.

Ceresini T. Maintaining the Forensic Viability of Log Files. System Administration, Networking, and Security Institute (SANS) – Global Information Assurance Certification (GIAC); 2001. http://www.giac.org/paper/gsec/801/maintaining-forensic-viability-log-files/101724.

Choksy C.E.B. 8 steps to develop a taxonomy. The Information Management Journal. 2006. http://www.arma.org/bookstore/files/Choksy.pdf.

Chow K.-P, Shenoi S, eds. Advances in Digital Forensics VI. Sixth IFIP WG 11.9 International Conference on Digital Forensics. Hong Kong: China; 2010. http://www.springer.com/us/book/9783642155055.

Ciardhuáin S.Ó. An extended model of cybercrime investigations. International Journal of Digital Evidence. 2004;3(1). https://www.utica.edu/academic/institutes/ecii/publications/articles/A0B70121-FD6C-3DBA-0EA5C3E93CC575FA.pdf.

Cichonski P, Millar T, Grance T, Scarfone K. Computer Security Incident Handling Guide. National Institute of Standards and Technology (NIST); 2012. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf.

Communication Safety Establishment. Harmonized Threat and Risk Assessment Methodology. Royal Canadian Mounted Police; 2007. https://www.cse-cst.gc.ca/en/system/files/pdf_documents/tra-emr-1-e.pdf.

Contesti D.-L, et al. Official (ISC)2 Guide to the SSCP CBK. Auerbach Publications; 2007: 9780849327742.

Cornell University Law School. Admissible Evidence. 2014. https://www.law.cornell.edu/wex/admissible_evidence.

Cornell University Law School. Brady Rule. 2014. https://www.law.cornell.edu/wex/brady_rule.

Cornell University Law School. Federal Rules of Civil Procedure. 2014. https://www.law.cornell.edu/rules/frcp/.

Cornell University Law School. Federal Rules of Evidence. 2014. https://www.law.cornell.edu/rules/fre.

Daubert Standard. Cornell University Law School; 2015. https://www.law.cornell.edu/wex/daubert_standard.

Daubert Test, Legal Dictionary – the Free Dictionary. 2008. http://legal-dictionary.thefreedictionary.com/Daubert+standard.

Fenu G, Solinas F. Computer Forensics Investigation an Approach to Evidence in Cyberspace. Italy: University of Cagliari, Department of Computer Science Cagliari; 2013. http://sdiwc.net/digital-library/download.php?id=00000541.pdf.

Finkle J, Heavey S. UPDATE 2-Target Says it Declined to Act on Early Alert of Cyber Breach. Reuters; 2014. http://www.reuters.com/article/2014/03/13/target-breach-idUSL2N0MA1MW20140313.

ForensicFocus. Computer Forensics Education. 2015. http://www.forensicfocus.com/education.

Forrester. Application Control: An Essential Endpoint Security Component. 2012. http://www.forrester.com/Application+Control+An+Essential+Endpoint+Security+Component/fulltext/-/E-RES78502.

Forrester. Prepare for Anywhere, Anytime, Any-Device Engagement With A Stateless Mobile Architecture. 2012. http://www.forrester.com/Prepare+For+Anywhere+Anytime+AnyDevice+Engagement+With+A+Stateless+Mobile+Architecture/fulltext/-/E-RES61569.

Freiling F.C, Schwittay B. A Common Process Model for Incident Response and Computer Forensics. Germany: Laboratory for Dependable Distributed Systems, University of Mannheim; 2007. https://www1.informatik.uni-erlangen.de/filepool/publications/imf2007-common-model.pdf.

Gartner Research. Enterprise Endpoint Protection When the Consumer Is King. 2013. http://www.gartner.com/document/2402415.

Ghorbani A.A, Lu W, Tavallaee M. Network Intrusion Detection and Prevention Concepts and Techniques. Springer; 2010: 9780387887708.

Gregory P. CISSP Guide to Security Essentials. Nelson Education; 2014: 9781305840478.

Grobler C.P, Louwrens C.P. Digital Forensic Readiness as a Component of Information Security Best Practice. Springer; 2007.

Harris E.A, Perlroth N. Target Missed Signs of a Data Breach. New York Times; 2014. http://www.nytimes.com/2014/03/14/business/target-missed-signs-of-a-data-breach.html?_r=0.

Hay D.C. Requirements Analysis: From Business Views to Architecture. Prentice Hall Professional; 2003: 9780130282286.

Hernan S, Lambert S, Ostwald T, Shostack A. Uncover Security Design Flaws Using the STRIDE Approach. MSDN Magazine; 2006. https://msdn.microsoft.com/en-us/magazine/cc163519.aspx.

Hernandez S. Official Guide to the CISSP CBK. third ed. CRC Press; 2012: 9781466569782.

HG Legal Resources. Information Technology Law. HGEXPERTS; 2015. http://www.hg.org/information-technology-law.html.

Ieong R.S.C. FORZA – Digital Forensics Investigation Framework that Incorporate Legal Issues. Elsevier; 2006. http://www.dfrws.org/2006/proceedings/4-Ieong.pdf.

InfoSec Reading Room. An Overview of Threat and Risk Assessment. SANS Institute; 2002. http://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76.

International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), ISO/IEC 27005. 2011 Information Technology – Security Techniques-Information Security Risk Management. 2011.

Investopedia. http://www.investopedia.com/ 2015a.

Investopedia. Market-Orientation. 2015. http://www.investopedia.com/terms/m/market-orientation.asp.

Jarke M, et al. Fundamentals of Data Warehouse. Springer Science & Business Media; 2013: 9783662051535.

Kabay M.E. A Brief History of Computer Crime: An Introduction for Students. 2008. http://www.mekabay.com/overviews/history.pdf.

Karake-Shalhoub Z, Al Qasimi L. Cyber Law and Cyber Security in Developing and Emerging Economies. Edward Elgar Publishing; 2010: 9781849803380.

Kedar T.J. Advanced Database Management. Technical Publications; 2008: 9788184310962.

Kent K, Chevalier S, Grance T, Dang H. Special Publication 800–86: Guide to Integrating Forensic Techniques into Incident Response. National Institute of Standards and Technology (NIST); 2006. http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf.

Kissel R, et al. Special Publication 800–64 R2: Security Considerations in the System Development Life Cycle. National Institute of Standards and Technology (NIST); 2008. http://csrc.nist.gov/publications/nistpubs/800-64-Rev2/SP800-64-Revision2.pdf.

Kohn M, Eloff J.H.P, Olivier M.S. Framework for a Digital Forensic Investigation. Information and Computer Security Architectures Research Group (ICSA), Department of Computer Science, University of Pretoria; 2006. http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/101_Paper.pdf.

Krebs B. The Target Breach, by the Numbers. KrebsOnSecurity; 2014. http://krebsonsecurity.com/2014/05/the-target-breach-by-the-numbers/.

Kruse II. W.G, Heiser J.G. Computer Forensics – Incident Response Essentials. Indianapolis: Pearson; 2004.

Landoll D. The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments. second ed. CRC Press; 2011: 9781439821497.

Law Crossing. Information Technology Attorney Job Description. Employment Research Institute; 2015. http://www.lawcrossing.com/job-description/6048/information-technology-attorney-jobs.

Law Donut. Employment Law – Discipline and Grievance. 2015. http://www.lawdonut.co.uk/law/employment-law/discipline-and-grievance/disciplinary-issues-faqs#7.

Lee H.C, Palmbach T.M, Miller M.T. Henry Lee’s Crime Scene Handbook. San Diego: Academic Press; 2001.

Lloyd I. Information Technology Law. Oxford University Press; 2014: 9780198702320.

MacDonald N. The Future of Information Security Is Context Aware and Adaptive. 2010 G00200385. Gartner Research.

Malega P. Escalation management as the necessary form of incident management process. CIS Journal of Emerging Trends in Computing and Information Science. 2014. http://www.cisjournal.org/journalofcomputing/archive/vol5no8/vol5no8_8.pdf.

Mandia K, Prosise C, Pepe M. Incident Response & Computer Forensics. second ed. McGraw-Hill; 2003.

Marcella Jr. A, Menendez D. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. second ed. CRC Press; 2007: 9781439848234.

Marquis H. A Study Guide to Service Catalogue from the Principles of Itil V3. vol. 3. The Stationery Office; 2010: 9780117063648.

Mellon C. CMMISM for Software Engineering (CMMI-SW, V1.1). 2002. http://resources.sei.cmu.edu/asset_files/TechnicalReport/2002_005_001_14069.pdf.

Microsoft. Threat Modelling. 2003. https://msdn.microsoft.com/en-us/library/ff648644.aspx.

Microsoft. The STRIDE Threat Model. 2005. https://msdn.microsoft.com/en-us/library/ee823878%28v=cs.20%29.aspx.

Microsoft. Secure Boot Overview. 2014. https://technet.microsoft.com/en-ca/library/hh824987.aspx.

Mohay G, Anderson A, Collie B, De Vel O, McKemmish R. Computer and Intrusion Forensics. Massachusetts: Artech House; 2003.

National Institute of Standards and Technology (NIST). Computer Forensic Tool Testing Project. 2012. http://www.cftt.nist.gov/CFTT-Booklet-Revised-02012012.pdf.

Nelson B, Phillips A, Enfinger F, Steuart C. Guide to Computer Forensics and Investigations. Massachusetts: Thomson Learning; 2004: 0-619-13120-9.

Newsome B. A Practical Introduction to Security and Risk Management. SAGE Publications; 2013: 9781452290270.

O’Loughlin M. The Service Catalog: Best Practices. Van Haren; 2010: 9789087535728.

Office of Legal Education Executive Office for United States Attorneys, Department of Justic. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. 2009. http://www.justice.gov/criminal/cybercrime/docs/ssmanual2009.pdf.

OLAP.COM. OLAP Definition. 2015. http://olap.com/olap-definition/.

Open Web Application Security Project (OWASP). 2010 T10 Architecture Diagram. 2010. https://owasp.org/index.php?title=File:2010-T10-ArchitectureDiagram.png.

Open Web Application Security Project (OWASP). Threat Modeling. 2015. https://www.owasp.org/index.php/Threat_Modeling.

Open Web Application Security Project (OWASP). Threat Risk Modelling. 2015. https://www.owasp.org/index.php/Threat_Risk_Modeling.

Palmer G. DTR-T001–01 Technical Report. A Road Map for Digital Forensic Research. Utica, New York: Digital Forensics Workshop (DFRWS); 2001.

Perumal S. Digital forensic model based on Malaysian investigation process. IJCSNS International Journal of Computer Science and Network Security. August 2009;9 (8).

People’s Law Dictionary. Bad Faith. 2015. http://dictionary.law.com/Default.aspx?selected=21.

Peterson G, Shenoi S. Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference on Digital Forensics. Springer; 2013: 9783642411489.

Pilli E.S, Joshi R.C, Niyogi R. A generic framework for network forensics. International Journal of Computer Applications. 2010;1(11). http://www.ijcaonline.org/journal/number11/pxc387408.pdf.

Pollitt M.M. Computer forensics: an approach to evidence in cyberspace. In: Proceeding of the National Information Systems Security Conference. vol. II. 1995 Baltimore.

Ponniah P. Data Warehouse Fundamentals: A Comprehensive Guide for IT Professionals. John Wiley & Sons; 2004: 9780471463894.

Porterfield J. File Sharing: Rights and Risks. The Rosen Publishing Group; 2014: 9781477776407.

Press Release. FBI “hack” Raises Global Security Concerns. CNET; 2002. http://www.cnet.com/news/fbi-hack-raises-global-security-concerns/.

Press Release. Alexey Ivanov and Vasiliy Gorshkov: Russian Hacker Roulette. CSO; 2005. http://www.csoonline.com/article/2118241/malware-cybercrime/alexey-ivanov-and-vasiliy-gorshkov–russian-hacker-roulette.html.

Press Release. Profile Gary McKinnon. BBC News; 2008. http://news.bbc.co.uk/2/hi/technology/4715612.stm.

Press Release. Pirate Bay File-Sharing Trial to Start in Sweden. Telegraph Media Group Limited; 2009. http://www.telegraph.co.uk/technology/8580318/Top-five-internet-piracy-battles.html.

Press Release. SEC Charges Company CEO and Former CFO with Hiding Internal Controls Deficiencies and Violating Sarbanes-Oxley Requirements. US Securities and Exchange Commissions; 2014. http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370542561150.

Queensland Government. Identifying Business Risk. 2014. https://www.business.qld.gov.au/business/running/risk-management/identifying-business-risk.

Ray D.A, Bradford P.G. Models of Models: Digital Forensics and Domain Specific Languages. Tuscaloosa, AL: Department of Computer Science, University of Alabama; 2007 Box 870290. http://www.ioc.ornl.gov/csiirw/07/abstracts/Bradford-Abstract.pdf.

Ray I, Shenoi S. Advances in Digital Forensics IV. Springer; 2008: 978-0-387-84927-0.

ReelLawyers. Lessons of AMD v. Intel. 2013. https://www.youtube.com/watch?v=jQ_9uLkw_Uo.

Reith M, Carr C, Gunsh G. An examination of digital forensics models. International Journal of Digital Evidence. 2002;1 (3).

Rogers M.K, Goldman J, Mislan R, Wedge T, Debrota S. Computer forensics field triage process model. Journal of Digital Forensics, Security and Law. 2006;1.

Rooney P. Microsoft’s CEO: 80–20 Rule Applies to Bugs, Not Just Features. CRN; 2002. http://www.crn.com/news/security/18821726/microsofts-ceo-80-20-rule-applies-to-bugs-not-just-features.htm.

Rowlingson A. Ten step process for forensic readiness Elsevier. International Journal of Digital Evidence. 2004;2(3).

Royal Canadian Mounted Police. Crime Prevention Through Environmental Design. Government of Canada; 2011. http://www.rcmp-grc.gc.ca/pubs/ccaps-spcca/safecomm-seccollect-eng.htm.

de Rus G. Introduction to Cost-benefit Analysis. Edward Elgar Publishing Inc; 2010: 9781848448520.

Saitta P, Larcom B, Eddington M. TRIKE V.1 Methodology Document. 2005. http://www.octotrike.org/papers/Trike_v1_Methodology_Document-draft.pdf.

SANS. Developing a Computer Forensics Team. 2001. http://www.sans.org/reading-room/whitepapers/incident/developing-computer-forensics-team-628.

SANS. Information Security Policy Templates. 2015. https://www.sans.org/security-resources/policies/.

Schmitt V, Jordaan J. Establishing the validity of MD5 and SHA-1 hashing in digital forensic practice in light of recent research demonstrating cryptographic weaknesses in these algorithms. International Journal of Computer Applications. 2013. http://www.lex-informatica.org/2%20Ensuring%20the%20Legality%20of%20the%20Digital%20Forensics%20Process%20in%20South%20Africa.pdf.

Schniederjans M.J, Hamaker J.L, Schniederjans A.M. Information Technology Investment: Decision-Making Methodology. World Scientific Co. Pte. Ltd; 2004: 9812386955.

Scientific Working Group on Digital Evidence (SWGDE). Model Standard Operation Procedures Version 3.0. 2012. https://www.swgde.org/documents/Current+Documents/SWGDE+QAM+and+SOP+Manuals/2012-09-13+SWGDE+Model+SOP+for+Computer+Forensics+v3.

Security Awareness Program Special Interest Group PCI Security Standards Council. Information Supplement: Best Practices for Implementing a Security Awareness Program. PCI Security Standards Council; 2014. https://www.pcisecuritystandards.org/documents/PCI_DSS_V1.0_Best_Practices_for_Implementing_Security_Awareness_Program.pdf.

State of North Dakota. Requirements Analysis. New York State Office for Technology; 2001. https://www.nd.gov/itd/files/services/pm/requirements-analysis-guidebook.pdf.

Stephenson P. A Comprehensive Approach to Digital Incident Investigation. Elsevier; 2003. http://www.emich.edu/cerns/downloads/pstephen/Comprehensive-Approach-to-Digital-Investigation.pdf.

Sule D. Importance of forensic readiness. ISACA Journal. 2014;1. http://www.isaca.org/Journal/archives/2014/Volume-1/Pages/JOnline-Importance-of-Forensic-Readiness.aspx#11.

Tan J. Forensic Readiness. 2001. http://home.eng.iastate.edu/∼guan/course/backup/CprE-592-YG-Fall-2002/paper/forensic_readiness.pdf.

Taruu.com. ITIL v3 Study Guide. Taruu LLC; 2009. http://taruu.com/Documents/ITIL%20v3%20Foundation%20Study%20Guide%20v4.2.2.5.pdf.

TechTarget. Cloud Computing. 2015. http://searchcloudcomputing.techtarget.com/definition/cloud-computing.

TechTarget. Cloud Provider. 2015. http://searchcloudprovider.techtarget.com/definition/cloud-provider.

TechTarget. IT Asset. 2008. http://whatis.techtarget.com/definition/IT-asset.

TechTarget. Principle of Least Privilege (POLP). 2015. http://searchsecurity.techtarget.com/definition/principle-of-least-privilege-POLP.

TechTarget. Total Cost of Ownership. 2015. http://searchdatacenter.techtarget.com/definition/TCO.

TechTarget. Cloud Computing. 2015. http://searchcloudcomputing.techtarget.com/definition/cloud-computing.

TechTarget. Cloud Provider. 2015. http://searchcloudprovider.techtarget.com/definition/cloud-provider.

The MITRE Corporation. About STIX. 2015. http://stixproject.github.io/about/.

The MITRE Corporation. STIX Project. 2015. http://stixproject.github.io/about/.

Tipton H.F. (ISC)2 Official Guide to the ISSAP CBK. CRC Press; 2011: 9781439800935.

Tipton H.F. (ISC)2 Official Guide to the ISSMP CBK. CRC Press; 2011: 9781420094435.

Treasury Board of Canada Secretariat. Guide to Risk Taxonomies. Government of Canada; 2011. http://www.tbs-sct.gc.ca/tbs-sct/rm-gr/guides/grt-gtr01-eng.asp.

Treasury Board of Canada. Guide to Integrated Risk Management. Government of Canada; 2012. http://www.tbs-sct.gc.ca/tbs-sct/rm-gr/guides/girm-ggir02-eng.asp.

Treasury Board of Canada. Guide to Integrated Risk Management. Government of Canada; 2012. http://www.tbs-sct.gc.ca/tbs-sct/rm-gr/guides/girm-ggir04-eng.asp.

U.S. Department of Justice. Electronic Crime Scene Investigation: A Guide to First Responders. 2001. https://www.ncjrs.gov/pdffiles1/nij/187736.pdf.

United States District Court. Eastern District Court of Missouri, Eastern Division. U.S. Government Publishing Office; 2009 United States of America v. Joseph Schmidt, III. http://www.gpo.gov/fdsys/pkg/USCOURTS-moed-4_09-cr-00265/pdf/USCOURTS-moed-4_09-cr-00265-0.pdf.

US-CERT. Computer Forensics. 2008. https://www.us-cert.gov/sites/default/files/publications/forensics.pdf.

Versprite. PASTA Abstract. 2013. http://versprite.com/docs/PASTA_Abstract.pdf.

Webopedia. Mandatory Access Control. 2015. http://www.webopedia.com/TERM/M/Mandatory_Access_Control.html.

Webopedia. Metadata. 2015. http://www.webopedia.com/TERM/M/metadata.html.

Webopedia. Role-Based Access Control (RBAC). 2015. http://www.webopedia.com/TERM/S/structured_data.html.

Webopedia. Structured Data. 2015. http://www.webopedia.com/TERM/S/structured_data.html.

Webopedia. Unstructured Data. 2015. http://www.webopedia.com/TERM/U/unstructured_data.html.

Webopedia. Entity-relationship Diagram. 2015. http://www.webopedia.com/TERM/E/entity_relationship_diagram.html.

Wheeler E. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. Elsevier; 2011: 9781597496162.

Wilson M, Hash J. Special Publication 800-50: Building an Information Technology Security Awareness and Training Program. National Institute of Standards and Technology (NIST); 2003. http://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf.

Yasinsac A, Manzano Y. Policies to enhance computer and network forensics. In: IEEE Workshop on Information Assurance and Security. 2001.

Yusoff Y, Ismail R, Hassan Z. Common phases of computer forensics investigation models. International Journal of Computer Science & Information Technology (IJCSIT). 2011;3(3). http://airccse.org/journal/jcsit/0611csit02.pdf.

Zeltser L. The Many Fields of Digital Forensics and Incident Response. SANS Digital Forensics and Incident Response; 2014. https://digital-forensics.sans.org/blog/2014/01/30/many-fields-of-dfir.