A security professional receives an alert about an unknown user accessing a system within their organization. They attempt to identify, analyze, and preserve the associated criminal evidence. What security task does this scenario describe?
- Resolving error messages
- Programming with code
- Software upgrades
- Computer forensics