Discuss some of the differences in tools, techniques, skills and personnel that are needed between an intrusion into a network environment and a response to a single computer that is not part of a network environment.
Resources:
- Incident Response & Computer Forensics, 3rd Edition
- Any digital forensic forum or blog such as Forensic Focus (Links to an external site.), SANS Digital Forensics Blog (Links to an external site.), or the Magnet Forensics Blog
