Blog categorized as Digital Forensics
What can possibly go wrong with that iPhone? I’ll have a look (oh, it’s locked!), then switch it off, eject the SIM card and pass it on to the expert. Well, you’ve just made three of the five most common mistakes making subsequent unlock and extraction attempts significantly ...
-Ritik Singh
This protocol contains several rules which covers all the steps needed to comply with for completing all the process which is described below.
- Collection.
- Acquisition/imaging.
- Analysis
- Reporting.
Collection:-
As moving towards the collection of evidence from resources such as storage drive, ha...
Critical National Information Infrastructure (CNII)
(The views are of the author and all issues related to the contents be addressed directly to the Author)
Introduction
Critical National Information Infrastructure (CN...
Categories
- 4N6
(1)
- Digital Forensics
(3)



