Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How a forensic investigation is typically approached?

0
Posted

How a forensic investigation is typically approached?

0

Very broadly, the main phases are sometimes considered to be: – secure the subject system (from tampering or unauthorized changes during the investigation); – take a copy of hard drive/disk (if applicable and appropriate); – identify and recover all files (including deleted files); – access/view/copy hidden, protected and temp files; – study ‘special’ areas on the drive (for example, the residue from previously deleted files); – investigate the settings and any data from applications and programs used on the system; – consider the system as a whole from various perspectives, including its structure and overall contents; – consider general factors relating to the users computer and other activity and habits, in the context of the investigation; – create detailed and considered report, containing an assessment of the data and information collected. Throughout the investigation, a full audit log of all activities willmaintained and recorded. It is not unreasonable to include this in the r

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123