Talk:Digital forensic process
![]() | This article has not yet been rated on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||||
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
|
Digital Forensics Process written is incomplete see published article for full explanation
“The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation.”
Given this definition, this scientific process contains the following eight steps:
- Search authority - Chain of custody - Imaging/hashing function - Validated tools - Analysis - Repeatability (Quality Assurance) - Reporting - Possible expert presentation
Source: http://www.forensicmag.com/node/128 — Preceding unsigned comment added by 71.166.62.57 (talk) 00:42, 24 September 2011 (UTC)
Conflict of interest editing
A recent edit was made by a person who appears to have a conflict of interest. I have reverted this change without prejudice for them being restored by an editor who does to have a real or apparent conflict of interest. I have also advertised this edit and revert and a related set of edits and reverts to WikiProject Computing. WikiProject Computer Security is a more logical choice but it's talk page was too quiet. davidwr/(talk)/(contribs)/(e-mail) 19:28, 16 April 2013 (UTC)
- Seems a lot like hockum to me; such processes would be torn apart in any decent court. I should really look back at these articles at some point. Thanks for catching this David! --Errant (chat!) 14:39, 17 April 2013 (UTC)
Looking throuhgh; the paper actually is useful for the literature review. However I'd prefer to see it journalled before using it directly. And as to the ADAM process, I think that needs other sources to make note of it, especially as a new process, before we can cover it as significant. --Errant (chat!) 14:50, 17 April 2013 (UTC)
- All unassessed articles
- Start-Class Law enforcement articles
- Unknown-importance Law enforcement articles
- WikiProject Law Enforcement articles
- Start-Class Computing articles
- Low-importance Computing articles
- All Computing articles
- Start-Class Computer security articles
- Mid-importance Computer security articles
- Start-Class Computer security articles of Mid-importance
- All Computer security articles