CHECKLIST SOUNDNESS OF DIGITAL FORENSIC METHODOLOGY
| Security checklist | |||||
| Vulnerability | Improper forensic process | Course | CJS-313 | ||
| For each password: | Yes/No – describe | ||||
| 1. Preservation | |||||
| 2. Identification | |||||
| 3. Extraction | |||||
| 4. Interpretation | |||||
| 5. Documentation | |||||
| If you answered yes to 1 through 5, then all of the key activities for the digital forensic process have been considered. | |||||
