You are on page 1of 1

Cyber-Forensics

Cyber Forensics: - is the sentifix examination and analyst of the data on retrieve from
computer storage media in such a wage that the information can be used as evidence in a
court of a law.
1. Investigation computer crime
2. Before the investigation
i) Workstation and data recovery lab
ii) Build investigation team
iii) Enter into alliance with in local district anomy
iv) Police review and law
v) Assets risk
vi) Notifies decision maker
vii) Acquired authorization
viii) Computer Investigation tools
3. Computer forensics investigation methodology
i) collecting the evidence
ii) Preserving the evidence
iii) analyzing the Evidence
iv) Cloning The Evidenced
v) Perform Forensics Test
vi) Investigation the test
vii) Mapping of evidence and test result
viii) Conclusion are Derived
ix) Result with Entire Report generated
4. Steps to prefer for computer Forensics Investigation
5. People involved in a computer Forensics
6. Obtain search warrant
7. Evaluate secure the scene
8. Collect the evidence
Evidence has two types:-
1. Live evidence
2. Static evidence

Tools
FTK
SIFT

You might also like