The analysis must be capable of identifying deleted files and recovering them. Forensic acquisitions and media used to store digital evidence are documented as well.Ī detailed analysis of the data is done in order to determine facts in the case and the beneficiaries of the act are discovered. Images of physical disks, RAID volumes, and physical memory are collected and a proper chain of custody of the collected data must be maintained and documented on a standardized form. Collected sources of data are placed in a forensically sound manner and a report should be created detailing the collected information. That can be done by correlating processes with the intended authorities of pertinent institutions. The documentation is maintained to identify all available historical data maintained by a company.ĭata must be preserved in order to eliminate data destruction. Then, adequate documentation is maintained to identify all company network and server resources accessible by each employee. Also, a data collection plan must be established in order to ensure the privacy of data.Īn adequate asset document should be maintained to identify all physical assets under the control of each employee. Then, one needs to identify potential sources of relevant data. Initially, forensic investigation is carried out to understand the nature of the case.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |