“ Gathering and analyzing data in a manner as free from distortion or bias as possible to reconstruct data or what has happened in the past on a system” Farmer and Venema www.fish.com/security/forensics.html
Do You Have a Plan
Planning and Policy
Do you have an incident response policy in place?
Intrusions, viruses, denial of service, theft of service