L
laptop computer, portable drive, 32
law enforcement
best practices, 9
focus on prosecution , 11
incident response team (IRT) coordination with, 47
training on cybercrime , 13-15
lazarus program (Coroner's Toolkit), 179
leave no trace policy, 68-69
hardware write blocker, 69, 70
read-only image, 68-69
software write blocker, 69, 70
Legal Imager and reaSsembly Application, 113, 137 , 201, 250
legal liability, and unreported incidents, 10
Lexar Media JumpDrive, 32
listening, in court proceedings , 228
litigation, electronic documents for, 2
live computer system, handling, 81-82
local area network (LAN), 23
wireless, 35
log scanner utilities, 87
logs, 87
archiving, 79
evidence, 64-65, 65 , 230
for evidence of computer access, 128-129
importance of reviewing, 42
low-hanging fruit concept, 130-131