Talk:Digital forensic process
Appearance
![]() | Law Enforcement Start‑class | |||||||||
|
![]() | Computing Start‑class Low‑importance | |||||||||
|
![]() | Computer security: Computing Start‑class Mid‑importance | |||||||||||||||||
|
Digital Forensics Process written is incomplete see published article for full explanation
“The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation.”
Given this definition, this scientific process contains the following eight steps:
- Search authority - Chain of custody - Imaging/hashing function - Validated tools - Analysis - Repeatability (Quality Assurance) - Reporting - Possible expert presentation
Source: http://www.forensicmag.com/node/128 — Preceding unsigned comment added by 71.166.62.57 (talk) 00:42, 24 September 2011 (UTC)
Categories:
- Start-Class Law enforcement articles
- Unknown-importance Law enforcement articles
- WikiProject Law Enforcement articles
- Start-Class Computing articles
- Low-importance Computing articles
- All Computing articles
- Start-Class Computer security articles
- Mid-importance Computer security articles
- Start-Class Computer security articles of Mid-importance
- All Computer security articles