Legal Hold
A Legal Hold is a notice that informs an organization that they must preserve data and records that might be destroyed or modified in the course of their normal operations. Backups, paper documents, and electronic files of all sorts must be preserved.
e-discovery
The e-discovery process allows each side of a legal case to obtain evidence from each other and other parties involved in the case, and e-discovery is simply an electronic discovery process.
Order of Volatility
The Order of Volatility documents what data is most likely to be lost due to system operations or normal processes. Frequently changing information like the state of the CPU’s registers and cache is first and thus most volatile. Backups are least likely to change.
Chain-of-Custody
Chain-of-Custody forms are simple sign-off and documentation forms. Each time the drive, device, or artifact is accessed, transferred, or otherwise handled, it is documented.
Admissibility
Admissibility for digital forensics requires that the data be intact and unaltered and have provably remained unaltered before and during the forensic process.
dd
In Linux, dd is a command-line utility that allows you to create images for forensic or other purposes.
FTK Imager
FTK Imager is a free tool for creating forensic images. It supports raw (dd)-style format as well as SMART, E01, and AFF formats commonly used for forensic tools.
WinHex
WinHex is a disk editing tool that can also acquire disk images in raw format, as well as its own dedicated WinHex format. WinHex is useful for directly reading and modifying data from a drive, memory, RAID arrays, and other filesystems.
Provenance
Provenance describes where an image or drive came from and what happened with it.
Write Blocker
Write Blockers allow a drive or image to be read and accessed without allowing any writes to it.
Electronic Discovery Reference Model (EDRM)
EDRM is a useful model for viewing the e-discovery process.
What are the nine stages of the EDRM model?
Checksum
A Checksum generally has more collisions than a hash. Checksums are primarily used as a quick means of checking that the integrity of a file is maintained, whereas hashes are used for many other purposes such as secure password validation without retaining the original password.