Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an external source, and includes fraud, copyright infringement, and stolen data. This computer forensics and incident response book provides an organization's internal computer security specialists with a legal method for handling computer misuse as well as a means for securing sensitive data and identifying compromised systems, ultimately saving the organization the high cost of hiring an outside team of computer forensic investigators.