Investigators often work as a team to make computers and networks secure in an organization.
The computer investigations function is one of three in a triad that makes up computing
security. In an enterprise network environment, the triad consists of the following parts
(shown in Figure 1-2):
• Vulnerability assessment and risk management
• Network intrusion detection and incident response
• Computer investigations