Specifically,
the workshop explored how to identify various forms of data that may be
“hidden” on the physical storage medium; how to use write blockers and create
disk images in order to prevent accidental manipulation of volatile data; how
to identify and extract the data that a file system uses to manage files; how
to apply digital forensics tools and methods to collections of records; and how
to identify and compare alternative strategies for providing public access to
data from disk images.
No comments:
Post a Comment