From the Paper:
"The first step in a forensic computer analysis is to interview the investigators and the victims of a particular investigation. Interviews with the investigators and the victims help the analyst to gain a deeper understanding of the incident, learn about the results of investigation, about the views and concerns of the victims and the true nature of the incident. In addition to this, the analyst should also gather information about the information system or the computer involved in the incident, the suspects and the most probable lawsuit to be filed. Although, interviews are a preliminary step and often do not require too much allocation of time but they are the most important aspect of an investigation because they form the basis for the overall investigation."
Table of Contents:
Approach to Forensic Investigation
Interviewing and Examining the Evidence
Collection and Protection of the Evidence
Preparing for Analysis
Concluding the Investigation
the Internet is growing explosively, as is the number of crimes committed against or using computers. As a response to the growth of computer crime, the field of computer forensics has emerged. Computer forensics involves carefully collecting and examining electronic evidence that not only assesses the damage to a computer as a result of an electronic attack, but also to recover lost information from such a system to prosecute a criminal. With the growing importance of computer security today and the seriousness of cyber crime, it is important for computer professionals to understand the technology that is used in computer forensics. This paper will discuss the need for computer forensics to be practiced in an effective and legal way. It promotes the idea that the competent practice of computer forensics and awareness of applicable laws is essential for today's organizations.