Get premium membership and access questions with answers, video lessons as well as revision papers.
Four main steps in computer forensics
1. Acquisition : physically or remotely obtaining possession of the computer, all network mapping from the system and external physical storage
2. Identification : identify data that is recoverable and retrieved by using forensic tools
3. Evaluation :evaluated the recorded data to if could be used again as evidence
4. Presentation : presenting evidence to the lawyers in a manner that is understandable by the non-technical experts.
lydiajane74 answered the question on May 4, 2018 at 18:48
- Properties of a firewall (Solved)
Properties of a firewall
Date posted: May 4, 2018. Answers (1)
- Define controversial content(Solved)
Define controversial content.
Date posted: April 28, 2018. Answers (1)
- State the methods of verification giving examples(Solved)
State the methods of verification giving examples
Date posted: April 28, 2018. Answers (1)
- What is verification? (Solved)
What is verification?
Date posted: April 28, 2018. Answers (1)
- Why is authentication important?
(Solved)
Why is authentication important?
Date posted: April 28, 2018. Answers (1)
- State the examples of biometric devices (Solved)
State the examples of biometric devices
Date posted: April 28, 2018. Answers (1)
- What is authentication?
(Solved)
What is authentication?
Date posted: April 28, 2018. Answers (1)
- Why do we need privacy?
(Solved)
Why do we need privacy?
Date posted: April 28, 2018. Answers (1)
- How does computer technology threaten the privacy of our data? (Solved)
How does computer technology threaten the privacy of our data?
Date posted: April 28, 2018. Answers (1)
- Define privacy(Solved)
Define privacy
Date posted: April 28, 2018. Answers (1)
-
State the types of Intellectual Property Protection. (Solved)
State the types of Intellectual Property Protection.
Date posted: April 28, 2018. Answers (1)
- Define law(Solved)
Define law
Date posted: April 26, 2018. Answers (1)
- Define Ethics (Solved)
Define Ethics
Date posted: April 26, 2018. Answers (1)
- State the examples of unethical computer code of conducts
(Solved)
State the examples of unethical computer code of conducts
Date posted: April 26, 2018. Answers (1)
- Explain the impact of ICT on the society(Solved)
Explain the impact of ICT on the society.
Date posted: April 26, 2018. Answers (1)
- Explain the Usage of ICT in Daily Life(Solved)
Explain the Usage of ICT in Daily Life.
Date posted: April 26, 2018. Answers (1)
- Describe the evolution of computer(Solved)
Describe the evolution of computer
Date posted: April 26, 2018. Answers (1)
- There are two styles commonly used in LATEX to write bibliography. Name them and giving a valid reason explain which one is more flexible.(Solved)
There are two styles commonly used in LATEX to write bibliography. Name them and giving a valid reason explain which one is more flexible.
Date posted: April 24, 2018. Answers (1)
- State six risks to the information(Solved)
State six risks to the information.
Date posted: April 24, 2018. Answers (1)
- Define windows firewall and explain its functions(Solved)
Define windows firewall and explain its functions
Date posted: April 24, 2018. Answers (1)