Digital forensics professionals must have a thorough understanding of:
________ is a field dedicated to identifying, extracting, preserving, and reporting on information obtained from computer and network systems.
Digital forensics is a field dedicated to identifying, extracting, preserving, and reporting on information obtained from computer and network systems.
What does Computer forensics investigators do?
Gather digital information for computer system investigations, producing criminal evidence that can be used in a court of law.
What do Computer forensics technicians do?
Digital detectives who work with law enforcement or government entities, or as private investigators.
What do Forensic computer analysts do?
Specialize in the recovery of deleted emails or other data that has been encrypted or deleted. This material is used in legal cases involving computer crimes.
A _________ is a documentation of the possession of evidence.
A **chain of custody** is a documentation of the possession of evidence.
What is the Digital Forensic Process and what are all the steps?
Explain the first step in the digital foresnsic process:
We must first collect the data before we can examine and analyze it. The collection phase is the springboard to the digital forensics process which includes identifying, labeling, recording, and acquiring data from sources while following procedures to preserve the integrity of the data.
Explain the second step in the digital forensic process:
**Examination:** After we’ve collected the evidence, we begin the examination phase, which ensures that all data collected is relevant to the case. This includes forensically processing collected data and assessing and extracting data of interest while preserving the integrity of the data. This usually means working from a copy, rather than the original.