4 CHECKLIST SOUNDNESS OF DIGITAL FORENSIC PROCEDURE
Security checklist | |||||
Vulnerability | Improper forensic process | Course | CJS-313 | ||
For each password: | Yes/No – describe | N/A | |||
1. Search authority | |||||
2. Chain of custody | |||||
3. Imaging/hashing function | |||||
4. Validated tools | |||||
5. Analysis | |||||
6. Repeatability | |||||
7. Reporting | |||||
8. Possible Expert Presentation | |||||