CHECKLIST SOUNDNESS OF DIGITAL FORENSIC METHODOLOGY
Security checklist | |||||
Vulnerability | Improper forensic process | Course | CJS-313 | ||
For each password: | Yes/No – describe | ||||
1. Preservation | |||||
2. Identification | |||||
3. Extraction | |||||
4. Interpretation | |||||
5. Documentation | |||||
If you answered yes to 1 through 5, then all of the key activities for the digital forensic process have been considered. |