What are some ways to determine file ownership? (4)
Passwords on the computer/account
File metadata
network logs (for networked users)
who else lives there?
What are 2 ways companies bypass privacy issues to conduct investigations?
How can you prepare for a search warrant? (7 ways)
Name 6 tools that should be in a digital forensic field kit
What steps should you take when examining a device at a search? (5 + 3)
What are the 5 overall steps in any digital forensics case?