The identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data.

→ Used to investigate intrusions, to up your security, prevent future intrusion and maybe find the criminals. Can also be used for data recovery.

Phases:

image.png