From the course: SSCP Cert Prep: 4 Incident Response and Recovery
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
System and file forensics
From the course: SSCP Cert Prep: 4 Incident Response and Recovery
System and file forensics
- [Instructor] Digital evidence often comes from computers, mobile devices, and digital media that store information required by investigators. That's where forensic investigators use system and file forensic techniques to collect and preserve their digital evidence. Now remember, the first rule of evidence collection is that investigators must never take any action that alters the evidence itself, and may lead to misinterpretation. When it comes to systems and files, forensic investigators preserve this principle by never working with the actual physical evidence, unless absolutely necessary. They do this by creating copies or images of the physical evidence, and then using those images for forensic analysis. When a forensic analyst creates an image of a hard drive or other media, they must connect the device to the drive, and then use that device to copy off the data stored on the drive. Whenever a drive is connected…
Contents
-
-
-
-
(Locked)
Conducting investigations3m 52s
-
(Locked)
Evidence types3m 29s
-
(Locked)
Introduction to forensics3m 21s
-
(Locked)
System and file forensics4m 25s
-
(Locked)
Network forensics4m 16s
-
(Locked)
Software forensics4m 56s
-
(Locked)
Mobile device forensics1m 11s
-
(Locked)
Embedded device forensics2m 33s
-
(Locked)
Chain of custody1m 52s
-
(Locked)
Reporting and documenting incidents3m 33s
-
(Locked)
Electronic discovery (ediscovery)3m 7s
-
(Locked)
-
-
-
-