CHAPTER
5
image
Processing Evidence
We have our evidence, so we can begin working on it from within EnCase. This chapter walks you through the steps to get your case created and addresses several of the questions in our case study. We add our evidence to the case and begin looking at the options for processing evidence.
image
image
Creating the NIST Hacking Case
The work we’ve done up to this point has been using samples and examples. Now it is time to get started ...

Get Computer Forensics and Digital Investigation with EnCase Forensic v7 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.