Digital Forensics
Digital forensics → process of identifying, collecting, preserving, analyzing, and reporting digital evidence in a way that maintains integrity and supports legal or investigative use.
RFC 3227 Best Practices
Request for comments 3227 best practices → digital forensics guidelines that emphasize collecting volatile data first, minimizing system changes, documenting every action taken, preserving original evidence, and maintaining a clear chain of custody.
Legal Hold
Legal hold → formal directive that requires organizations to preserve relevant data and suspend deletion or modification when litigation or investigation is anticipated.
ESI
Electronically stored information (ESI) → digital data such as emails, documents, databases, logs, and backups that can be used as evidence in investigations or legal proceedings.
Chain of Custody
Chain of custody → documented record that tracks who collected, handled, transferred, and stored evidence to prove it was not altered or tampered with.
Data Acquisition
Data acquisition → forensic collection of data from sources such as disks, memory, firmware, operating system files, virtual machines, and snapshots while preserving evidence integrity.
Data Forensics Reporting
Data forensics reporting → creation of clear, factual documentation that explains how evidence was collected, analyzed, and interpreted so findings can be understood and defended.
Data Preservation
Data preservation → process of protecting evidence from alteration or loss by using write blockers, secure storage, hashing, and controlled access.
E-discovery
Electronic discovery (e-discovery) → legal process of identifying, collecting, and producing electronically stored information for litigation or regulatory investigations.
Firewall Logs
Firewall logs → records of allowed and blocked network traffic that help identify unauthorized access attempts, scanning activity, or policy violations.
Application Logs
Application logs → records generated by software applications that track errors, user actions, and system events relevant to troubleshooting and security analysis.
Endpoint Logs
Endpoint logs → records generated by endpoint devices such as laptops and servers that capture authentication attempts, system activity, and security events.
OS-Specific Security Logs
Operating system-specific security logs → logs maintained by the operating system that record authentication events, privilege changes, and system-level security actions.
IPS/IDS Logs
Intrusion prevention system and intrusion detection system logs → records of detected or blocked malicious activity that help identify attacks and validate security alerts.
Network Logs
Network logs → records of network activity such as connections, flows, and traffic patterns used to detect anomalies and trace attacker movement.
Metadata
Metadata → data about data that provides context such as creation time, modification history, file owner, or location, often critical in forensic investigations.
Email Metadata/Header
Email metadata and headers → routing and transmission details within an email that reveal sender, recipient, mail servers used, timestamps, and potential spoofing indicators.