Cyber Forensics
- Preservation
- Collection
- Validation
- Identification
- Analysis
- Interpretation
- Documentation and
- Presentation
…of computer evidence stored on a computer
Three A’s of Computer Forensics
Acquire the evidence without altering or damaging the original.
Authenticate that your recovered evidence is the same as the originally seized data.
Analyze the data without modifying it.