{"id":3495,"date":"2020-12-25T23:07:25","date_gmt":"2020-12-25T21:07:25","guid":{"rendered":"https:\/\/hackcontrol.org\/?page_id=3495"},"modified":"2021-08-09T15:45:19","modified_gmt":"2021-08-09T12:45:19","slug":"digital-forensics-and-incident-response-3","status":"publish","type":"page","link":"https:\/\/hackcontrol.org\/digital-forensics-and-incident-response-3\/","title":{"rendered":"Digital Forensics and Incident Response"},"content":{"rendered":"<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n\n<p style=\"margin-bottom: 15px; text-align: center;\"><b>We investigate cybercrime and analyze digital evidence.<\/b><\/p>\n\n\n\n<p class=\"has-text-align-center mb-4\">The goals of digital forensics investigations are determining the motive for a crime and finding its perpetrator, recovering and analyzing digital devices and digital information to present it as evidence in court, recovering files that have been erased, etc.<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kt-btns_3936ca-da, .site .entry-content .wp-block-kadence-advancedbtn.kt-btns_3936ca-da, .wp-block-kadence-advancedbtn.kb-btns_3936ca-da, .site .entry-content .wp-block-kadence-advancedbtn.kb-btns_3936ca-da{margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;}.wp-block-kadence-advancedbtn.kb-btns_3936ca-da{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:center;align-items:center;}.kt-btns_3936ca-da .kt-button{font-weight:normal;font-style:normal;}.kt-btns_3936ca-da .kt-btn-wrap-0{margin-right:5px;}.wp-block-kadence-advancedbtn.kt-btns_3936ca-da .kt-btn-wrap-0 .kt-button{color:#555555;border-color:#7f53b9;}.wp-block-kadence-advancedbtn.kt-btns_3936ca-da .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns_3936ca-da .kt-btn-wrap-0 .kt-button:focus{color:#ffffff;border-color:#444444;}.wp-block-kadence-advancedbtn.kt-btns_3936ca-da .kt-btn-wrap-0 .kt-button::before{display:none;}.wp-block-kadence-advancedbtn.kt-btns_3936ca-da .kt-btn-wrap-0 .kt-button:hover, .wp-block-kadence-advancedbtn.kt-btns_3936ca-da .kt-btn-wrap-0 .kt-button:focus{background:#444444;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kt-btn-align-center kt-btn-tablet-align-inherit kt-btn-mobile-align-inherit kt-btns-wrap kt-btns_3936ca-da btn-talk\"><div class=\"kt-btn-wrap kt-btn-wrap-0\"><a class=\"kt-button button kt-btn-0-action kt-btn-size-large kt-btn-style-basic kt-btn-svg-show-always kt-btn-has-text-true kt-btn-has-svg-false\" href=\"#getContactInfo\"><span class=\"kt-btn-inner-text\">Talk to an Expert<\/span><\/a><\/div><\/div>\n\n\n\n<p style=\"text-align: center; font-size: 20pt;\"><b>Stages of digital forensics<\/b><\/p>\n\n\n<style>#kt-layout-id_4a714f-80 > .kt-row-column-wrap{align-content:start;}:where(#kt-layout-id_4a714f-80 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}#kt-layout-id_4a714f-80 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:1320px;padding-top:var( --global-kb-row-default-top, 25px );padding-bottom:var( --global-kb-row-default-bottom, 25px );padding-left:9px;padding-right:15px;grid-template-columns:repeat(2, minmax(0, 1fr));}#kt-layout-id_4a714f-80 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){#kt-layout-id_4a714f-80 > .kt-row-column-wrap{grid-template-columns:repeat(2, minmax(0, 1fr));}}@media all and (max-width: 767px){#kt-layout-id_4a714f-80 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style>\n<div class=\"wp-block-kadence-rowlayout alignnone ticss-57a437b2\"><div id=\"kt-layout-id_4a714f-80\" class=\"kt-row-layout-inner kt-layout-id_4a714f-80\"><div class=\"kt-row-column-wrap kt-has-2-columns kt-gutter-default kt-v-gutter-default kt-row-valign-top kt-row-layout-equal kt-tab-layout-inherit kt-m-colapse-left-to-right kt-mobile-layout-row kb-theme-content-width\"><style>.kadence-column_c8e8cf-ac > .kt-inside-inner-col{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;}.kadence-column_c8e8cf-ac > .kt-inside-inner-col,.kadence-column_c8e8cf-ac > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column_c8e8cf-ac > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column_c8e8cf-ac > .kt-inside-inner-col{flex-direction:column;}.kadence-column_c8e8cf-ac > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column_c8e8cf-ac > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column_c8e8cf-ac{position:relative;}@media all and (max-width: 1024px){.kadence-column_c8e8cf-ac > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column_c8e8cf-ac > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column inner-column-1 kadence-column_c8e8cf-ac digital-column\"><div class=\"kt-inside-inner-col\">\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-medium\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"211\" src=\"https:\/\/hackcontrol.org\/wp-content\/uploads\/2020\/12\/hacker-1-300x211.png\" alt=\"\" class=\"wp-image-3216\" srcset=\"https:\/\/hackcontrol.org\/wp-content\/uploads\/2020\/12\/hacker-1-300x211.png 300w, https:\/\/hackcontrol.org\/wp-content\/uploads\/2020\/12\/hacker-1-768x540.png 768w, https:\/\/hackcontrol.org\/wp-content\/uploads\/2020\/12\/hacker-1-356x250.png 356w, https:\/\/hackcontrol.org\/wp-content\/uploads\/2020\/12\/hacker-1.png 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n\n<p style=\"margin-bottom: 15px; margin-top: 100px; text-align: left;\"><b>Documentation stage<\/b><\/p>\n<p style=\"margin-bottom: 25px; text-align: left;\">Investigators document the evidence by creating a record of all visible data. This helps visualize the crime scene and makes the review process simpler.<\/p>\n<p style=\"margin-bottom: 15px; text-align: left;\"><b>Reporting stage<\/b><\/p>\n<p style=\"text-align: left;\">Investigators create a detailed, easy to comprehend report to summarize and explain the conclusions reached during the investigation.<\/p>\n<\/div><\/div>\n\n\n<style>.kadence-column_c79cc0-8b > .kt-inside-inner-col{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;}.kadence-column_c79cc0-8b > .kt-inside-inner-col,.kadence-column_c79cc0-8b > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column_c79cc0-8b > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column_c79cc0-8b > .kt-inside-inner-col{flex-direction:column;}.kadence-column_c79cc0-8b > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column_c79cc0-8b > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column_c79cc0-8b{position:relative;}@media all and (max-width: 1024px){.kadence-column_c79cc0-8b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column_c79cc0-8b > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column inner-column-2 kadence-column_c79cc0-8b ticss-2d7b3bc3 digital-column\"><div class=\"kt-inside-inner-col\">\n<p style=\"margin-bottom: 15px; text-align: left;\"><strong>Identification stage<\/strong><\/p>\n<p style=\"margin-bottom: 25px; text-align: left;\">Relevant digital evidence is identified and located.&nbsp;<\/p>\n<p style=\"margin-bottom: 15px; text-align: left;\"><strong>Preservation stage<\/strong><\/p>\n<p style=\"margin-bottom: 25px; text-align: left;\">Digital forensics professionals isolate the information or digital device and take steps to secure and preserve the evidence.<\/p>\n<p style=\"margin-bottom: 15px; text-align: left;\"><strong>Analysis stage<\/strong><\/p>\n<p style=\"margin-bottom: 25px; text-align: left;\">The evidence is examined and reconstructed. Based on this, agents involved in the investigation draw conclusions relevant to the investigation.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/hackcontrol.org\/wp-content\/uploads\/2020\/12\/security.svg\" alt=\"\" class=\"wp-image-3943\" width=\"300\" height=\"274\"\/><\/figure><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n\n<\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><style>#kt-layout-id_f2f23d-25 > .kt-row-column-wrap{align-content:start;}:where(#kt-layout-id_f2f23d-25 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}#kt-layout-id_f2f23d-25 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:1320px;padding-top:var( --global-kb-row-default-top, 25px );padding-bottom:var( --global-kb-row-default-bottom, 25px );padding-top:150px;padding-left:15px;padding-right:15px;grid-template-columns:minmax(0, 1fr);}#kt-layout-id_f2f23d-25 > .kt-row-layout-overlay{opacity:0.30;}@media all and (max-width: 1024px){#kt-layout-id_f2f23d-25 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){#kt-layout-id_f2f23d-25 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style>\n<div class=\"wp-block-kadence-rowlayout alignnone\"><div id=\"kt-layout-id_f2f23d-25\" class=\"kt-row-layout-inner kt-layout-id_f2f23d-25\"><div class=\"kt-row-column-wrap kt-has-1-columns kt-gutter-default kt-v-gutter-default kt-row-valign-top kt-row-layout-equal kt-tab-layout-inherit kt-m-colapse-left-to-right kt-mobile-layout-row kb-theme-content-width\"><style>.kadence-column_15fa6c-40 > .kt-inside-inner-col{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;}.kadence-column_15fa6c-40 > .kt-inside-inner-col,.kadence-column_15fa6c-40 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column_15fa6c-40 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column_15fa6c-40 > .kt-inside-inner-col{flex-direction:column;}.kadence-column_15fa6c-40 > .kt-inside-inner-col > .aligncenter{width:100%;}.kadence-column_15fa6c-40 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column_15fa6c-40{position:relative;}@media all and (max-width: 1024px){.kadence-column_15fa6c-40 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}@media all and (max-width: 767px){.kadence-column_15fa6c-40 > .kt-inside-inner-col{flex-direction:column;justify-content:center;}}<\/style>\n<div class=\"wp-block-kadence-column inner-column-1 kadence-column_15fa6c-40\"><div class=\"kt-inside-inner-col\"><style>.kt-accordion-id_ac772d-89 .kt-accordion-inner-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:10px;}.kt-accordion-id_ac772d-89 .kt-accordion-panel-inner{border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:25px;border-bottom-left-radius:25px;background:#ffffff;padding-top:0px;padding-right:40px;padding-bottom:27px;padding-left:40px;}.kt-accordion-id_ac772d-89 > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header{border-top-color:rgba(0,0,0,0);border-right-color:rgba(0,0,0,0);border-bottom-color:rgba(0,0,0,0);border-left-color:rgba(0,0,0,0);border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;border-top-left-radius:25px;border-top-right-radius:25px;border-bottom-right-radius:25px;border-bottom-left-radius:25px;background:#ffffff;font-size:18px;line-height:22px;font-family:Montserrat;font-weight:700;color:#444444;padding-top:27px;padding-right:14px;padding-bottom:27px;padding-left:40px;}.kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle )  > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap .kt-blocks-accordion-icon-trigger:after, .kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle )  > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap .kt-blocks-accordion-icon-trigger:before{background:#444444;}.kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-blocks-accordion-icon-trigger{background:#444444;}.kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-blocks-accordion-icon-trigger:after, .kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-blocks-accordion-icon-trigger:before{background:#ffffff;}.kt-accordion-id_ac772d-89 > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header:hover, \n\t\t\t\tbody:not(.hide-focus-outline) .kt-accordion-id_ac772d-89 .kt-blocks-accordion-header:focus-visible{color:#444444;background:#ffffff;border-top-color:#d4d4d4;border-right-color:#d4d4d4;border-bottom-color:#d4d4d4;border-left-color:#d4d4d4;}.kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle ) .kt-accordion-header-wrap .kt-blocks-accordion-header:hover .kt-blocks-accordion-icon-trigger:after, .kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle ) .kt-accordion-header-wrap .kt-blocks-accordion-header:hover .kt-blocks-accordion-icon-trigger:before, body:not(.hide-focus-outline) .kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle ) .kt-blocks-accordion--visible .kt-blocks-accordion-icon-trigger:after, body:not(.hide-focus-outline) .kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle ) .kt-blocks-accordion-header:focus-visible .kt-blocks-accordion-icon-trigger:before{background:#444444;}.kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-accordion-header-wrap .kt-blocks-accordion-header:hover .kt-blocks-accordion-icon-trigger, body:not(.hide-focus-outline) .kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-accordion-header-wrap .kt-blocks-accordion-header:focus-visible .kt-blocks-accordion-icon-trigger{background:#444444;}.kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-accordion-header-wrap .kt-blocks-accordion-header:hover .kt-blocks-accordion-icon-trigger:after, .kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-accordion-header-wrap .kt-blocks-accordion-header:hover .kt-blocks-accordion-icon-trigger:before, body:not(.hide-focus-outline) .kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-accordion-header-wrap .kt-blocks-accordion-header:focus-visible .kt-blocks-accordion-icon-trigger:after, body:not(.hide-focus-outline) .kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-accordion-header-wrap .kt-blocks-accordion-header:focus-visible .kt-blocks-accordion-icon-trigger:before{background:#ffffff;}.kt-accordion-id_ac772d-89 .kt-accordion-header-wrap .kt-blocks-accordion-header:focus-visible,\n\t\t\t\t.kt-accordion-id_ac772d-89 > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header.kt-accordion-panel-active{color:#444444;background:#ffffff;border-top-color:#eeeeee;border-right-color:#eeeeee;border-bottom-color:#eeeeee;border-left-color:#0e9cd1;}.kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle )  > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header.kt-accordion-panel-active .kt-blocks-accordion-icon-trigger:after, .kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basiccircle ):not( .kt-accodion-icon-style-xclosecircle ):not( .kt-accodion-icon-style-arrowcircle )  > .kt-accordion-inner-wrap > .wp-block-kadence-pane > .kt-accordion-header-wrap > .kt-blocks-accordion-header.kt-accordion-panel-active .kt-blocks-accordion-icon-trigger:before{background:#444444;}.kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-blocks-accordion-header.kt-accordion-panel-active .kt-blocks-accordion-icon-trigger{background:#444444;}.kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-blocks-accordion-header.kt-accordion-panel-active .kt-blocks-accordion-icon-trigger:after, .kt-accordion-id_ac772d-89:not( .kt-accodion-icon-style-basic ):not( .kt-accodion-icon-style-xclose ):not( .kt-accodion-icon-style-arrow ) .kt-blocks-accordion-header.kt-accordion-panel-active .kt-blocks-accordion-icon-trigger:before{background:#ffffff;}@media all and (max-width: 767px){.kt-accordion-id_ac772d-89 .kt-accordion-inner-wrap{display:block;}.kt-accordion-id_ac772d-89 .kt-accordion-inner-wrap .kt-accordion-pane:not(:first-child){margin-top:10px;}}<\/style>\n<div class=\"wp-block-kadence-accordion alignnone accordion-wrap\" id=\"accordionitem2\"><div class=\"kt-accordion-wrap kt-accordion-wrap kt-accordion-id_ac772d-89 kt-accordion-has-28-panes kt-active-pane-23 kt-accordion-block kt-pane-header-alignment-left kt-accodion-icon-style-basic kt-accodion-icon-side-right\" style=\"max-width:none\"><div class=\"kt-accordion-inner-wrap\" data-allow-multiple-open=\"false\" data-start-open=\"23\">\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-27 kt-pane_938323-fd accordion-item\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">What are the challenges of the digital forensics field?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>The field of digital forensics is experiencing a boom in popularity but there are many challenges that make the jobs of digital forensics professionals more difficult. First of all, the increase in the number of devices people use every day and the amount of internet activity most people have daily makes it difficult to conduct investigations. Secondly, hacking tools and tutorials are widely available today, which makes it easier for criminals to conceal their crimes. Another challenge is the sheer amount of digital storage space necessary to conduct such investigations. Finally, since most or even all of the evidence recovered and analyzed by digital forensics experts is non-physical, it makes it more difficult to prosecute the perpetrators and present the evidence in court.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-28 kt-pane_469fc8-17 accordion-item\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">In what situations is digital forensics used?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Digital forensics is widely used in fraud and bankruptcy investigations, industrial espionage and intellectual property theft cases, employment disputes, issues with inappropriate internet use by employees, etc.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-26 kt-pane_d39ed4-a1 accordion-item\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">What types of digital forensics are there?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>There are wireless, network, database, disk, email, memory, mobile phone and malware forensics.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-9 kt-pane_92f3d0-55 accordion-item\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">What are the main benefits of using digital forensics?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Digital forensics can help identify and track down hackers and cybercriminals no matter where in the world they are located, it also allows to obtain, analyze and interpret evidence that can later be used in court. It can also help businesses obtain information relevant to their networks and systems that might have been compromised.<\/p>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-kadence-pane kt-accordion-pane kt-accordion-pane-10 kt-pane_4a23c5-0b accordion-item\"><div class=\"kt-accordion-header-wrap\"><button class=\"kt-blocks-accordion-header kt-acccordion-button-label-show\"><span class=\"kt-blocks-accordion-title-wrap\"><span class=\"kt-blocks-accordion-title\">Are there any disadvantages to the digital forensics approach?<\/span><\/span><span class=\"kt-blocks-accordion-icon-trigger\"><\/span><\/button><\/div><div class=\"kt-accordion-panel kt-accordion-panel-hidden\"><div class=\"kt-accordion-panel-inner\">\n<p>Yes, there are a few disadvantages associated with the digital forensics approach. First of all, prosecutors can face difficulties when admitting digital evidence into court since it is necessary to prove that the data hasn\u2019t been tampered with. Secondly, creating and storing digital evidence is very expensive, plus, if the programs and tools used to deal with the data do not meet strict standards, then the evidence might not be admissible in court. Finally, prosecutors, attorneys and judges in the case need to have sufficient technical knowledge.<\/p>\n<\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":66,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"gtb_hide_title":false,"gtb_wrap_title":false,"gtb_class_title":"","gtb_remove_headerfooter":false,"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-3495","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Forensics and Incident Response - HackControl<\/title>\n<meta name=\"description\" content=\"HackControl provides expert digital forensics and incident response services to companies and organizations all over the world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hackcontrol.org\/digital-forensics-and-incident-response-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Forensics and Incident Response - HackControl\" \/>\n<meta property=\"og:description\" content=\"HackControl provides expert digital forensics and incident response services to companies and organizations all over the world.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackcontrol.org\/digital-forensics-and-incident-response-3\/\" \/>\n<meta property=\"og:site_name\" content=\"HackControl - cybersecurity consulting company, cyber security, penetration testing, security audit, brand protection, antiphishing, blockchain audit\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-09T12:45:19+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hackcontrol.org\\\/digital-forensics-and-incident-response-3\\\/\",\"url\":\"https:\\\/\\\/hackcontrol.org\\\/digital-forensics-and-incident-response-3\\\/\",\"name\":\"Digital Forensics and Incident Response - HackControl\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hackcontrol.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hackcontrol.org\\\/digital-forensics-and-incident-response-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hackcontrol.org\\\/digital-forensics-and-incident-response-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hackcontrol.org\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/icon_penetration.svg\",\"datePublished\":\"2020-12-25T21:07:25+00:00\",\"dateModified\":\"2021-08-09T12:45:19+00:00\",\"description\":\"HackControl provides expert digital forensics and incident response services to companies and organizations all over the world.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hackcontrol.org\\\/digital-forensics-and-incident-response-3\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hackcontrol.org\\\/digital-forensics-and-incident-response-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hackcontrol.org\\\/digital-forensics-and-incident-response-3\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hackcontrol.org\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/icon_penetration.svg\",\"contentUrl\":\"https:\\\/\\\/hackcontrol.org\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/icon_penetration.svg\",\"caption\":\"Penetration Testing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hackcontrol.org\\\/digital-forensics-and-incident-response-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/hackcontrol.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Forensics and Incident Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hackcontrol.org\\\/#website\",\"url\":\"https:\\\/\\\/hackcontrol.org\\\/\",\"name\":\"HackControl - cybersecurity consulting company, cyber security, penetration testing, security audit, brand protection, antiphishing, blockchain audit\",\"description\":\"cybersecurity, penetration testing, pentest, security audit, brand protection, AntiPhishing, blockchain audit, cyber security, consulting, services\",\"publisher\":{\"@id\":\"https:\\\/\\\/hackcontrol.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hackcontrol.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hackcontrol.org\\\/#organization\",\"name\":\"HackControl - cybersecurity consulting company, cyber security, penetration testing, security audit, brand protection, antiphishing, blockchain audit\",\"url\":\"https:\\\/\\\/hackcontrol.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hackcontrol.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hackcontrol.org\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Logo_dark.svg\",\"contentUrl\":\"https:\\\/\\\/hackcontrol.org\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Logo_dark.svg\",\"caption\":\"HackControl - cybersecurity consulting company, cyber security, penetration testing, security audit, brand protection, antiphishing, blockchain audit\"},\"image\":{\"@id\":\"https:\\\/\\\/hackcontrol.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Forensics and Incident Response - HackControl","description":"HackControl provides expert digital forensics and incident response services to companies and organizations all over the world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hackcontrol.org\/digital-forensics-and-incident-response-3\/","og_locale":"en_US","og_type":"article","og_title":"Digital Forensics and Incident Response - HackControl","og_description":"HackControl provides expert digital forensics and incident response services to companies and organizations all over the world.","og_url":"https:\/\/hackcontrol.org\/digital-forensics-and-incident-response-3\/","og_site_name":"HackControl - cybersecurity consulting company, cyber security, penetration testing, security audit, brand protection, antiphishing, blockchain audit","article_modified_time":"2021-08-09T12:45:19+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/hackcontrol.org\/digital-forensics-and-incident-response-3\/","url":"https:\/\/hackcontrol.org\/digital-forensics-and-incident-response-3\/","name":"Digital Forensics and Incident Response - HackControl","isPartOf":{"@id":"https:\/\/hackcontrol.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackcontrol.org\/digital-forensics-and-incident-response-3\/#primaryimage"},"image":{"@id":"https:\/\/hackcontrol.org\/digital-forensics-and-incident-response-3\/#primaryimage"},"thumbnailUrl":"https:\/\/hackcontrol.org\/wp-content\/uploads\/2019\/05\/icon_penetration.svg","datePublished":"2020-12-25T21:07:25+00:00","dateModified":"2021-08-09T12:45:19+00:00","description":"HackControl provides expert digital forensics and incident response services to companies and organizations all over the world.","breadcrumb":{"@id":"https:\/\/hackcontrol.org\/digital-forensics-and-incident-response-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackcontrol.org\/digital-forensics-and-incident-response-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hackcontrol.org\/digital-forensics-and-incident-response-3\/#primaryimage","url":"https:\/\/hackcontrol.org\/wp-content\/uploads\/2019\/05\/icon_penetration.svg","contentUrl":"https:\/\/hackcontrol.org\/wp-content\/uploads\/2019\/05\/icon_penetration.svg","caption":"Penetration Testing"},{"@type":"BreadcrumbList","@id":"https:\/\/hackcontrol.org\/digital-forensics-and-incident-response-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hackcontrol.org\/"},{"@type":"ListItem","position":2,"name":"Digital Forensics and Incident Response"}]},{"@type":"WebSite","@id":"https:\/\/hackcontrol.org\/#website","url":"https:\/\/hackcontrol.org\/","name":"HackControl - cybersecurity consulting company, cyber security, penetration testing, security audit, brand protection, antiphishing, blockchain audit","description":"cybersecurity, penetration testing, pentest, security audit, brand protection, AntiPhishing, blockchain audit, cyber security, consulting, services","publisher":{"@id":"https:\/\/hackcontrol.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackcontrol.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hackcontrol.org\/#organization","name":"HackControl - cybersecurity consulting company, cyber security, penetration testing, security audit, brand protection, antiphishing, blockchain audit","url":"https:\/\/hackcontrol.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hackcontrol.org\/#\/schema\/logo\/image\/","url":"https:\/\/hackcontrol.org\/wp-content\/uploads\/2019\/05\/Logo_dark.svg","contentUrl":"https:\/\/hackcontrol.org\/wp-content\/uploads\/2019\/05\/Logo_dark.svg","caption":"HackControl - cybersecurity consulting company, cyber security, penetration testing, security audit, brand protection, antiphishing, blockchain audit"},"image":{"@id":"https:\/\/hackcontrol.org\/#\/schema\/logo\/image\/"}}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/hackcontrol.org\/wp-json\/wp\/v2\/pages\/3495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackcontrol.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hackcontrol.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hackcontrol.org\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/hackcontrol.org\/wp-json\/wp\/v2\/comments?post=3495"}],"version-history":[{"count":36,"href":"https:\/\/hackcontrol.org\/wp-json\/wp\/v2\/pages\/3495\/revisions"}],"predecessor-version":[{"id":6388,"href":"https:\/\/hackcontrol.org\/wp-json\/wp\/v2\/pages\/3495\/revisions\/6388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackcontrol.org\/wp-json\/wp\/v2\/media\/66"}],"wp:attachment":[{"href":"https:\/\/hackcontrol.org\/wp-json\/wp\/v2\/media?parent=3495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}