0% found this document useful (0 votes)
28 views1 page

Unit 3

The document discusses the basic principles of digital forensics, including the 5 phases of a digital forensics investigation and introduces common digital forensics tools. It also covers the life of a digital forensic investigator and the 4 key phases of handling and processing digital evidence: identification, collection, acquisition, and preservation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views1 page

Unit 3

The document discusses the basic principles of digital forensics, including the 5 phases of a digital forensics investigation and introduces common digital forensics tools. It also covers the life of a digital forensic investigator and the 4 key phases of handling and processing digital evidence: identification, collection, acquisition, and preservation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

unit 3

basic principles and methodologies for digital forensics

https://www.guru99.com/digital-forensics.html

phases of digital forensics

https://ermprotect.com/blog/what-are-the-5-stages-of-a-digital-forensics-investigation/

introduction to digital forensics tools

https://www.guru99.com/computer-forensics-tools.html#:~:text=Digital%20Forensic%20Tools
%20are%20software,complete%20reports%20for%20legal%20procedures.

life of a digital forensic investigator

https://cyberstart.com/blog/a-day-in-the-life-digital-forensics-analyst/

evidence handling and processing of digital forensics

" There are four phases involved in the initial handling of digital evidence: identification,
collection, acquisition, and preservation ( ISO/IEC 27037 ; see Cybercrime Module 4 on
Introduction to Digital Forensics)."

You might also like