{"id":2417,"date":"2015-11-23T14:44:24","date_gmt":"2015-11-23T19:44:24","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5202online2016\/?page_id=2417"},"modified":"2017-01-17T07:40:36","modified_gmt":"2017-01-17T12:40:36","slug":"whatisforensics","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/whatisforensics\/","title":{"rendered":"Week 2: What is Forensics"},"content":{"rendered":"<p>What is Forensics?<\/p>\n<p>Stages of examination<\/p>\n<ul>\n<li>Seizure, Acquisition, Analysis and Reporting<\/li>\n<li>NIST \u2013 Collection, Examination, Analysis, Reporting<\/li>\n<\/ul>\n<p><strong>Topics and Required Reading<\/strong><br \/>\n<a href=\"https:\/\/forensiccontrol.com\/resources\/beginners-guide-computer-forensics\/\">https:\/\/forensiccontrol.com\/resources\/beginners-guide-computer-forensics\/<\/a><\/p>\n<p><a href=\"http:\/\/forensicandinvestigativeauditing.blogspot.com\/2010\/08\/five-phases-of-investigation.html\">http:\/\/forensicandinvestigativeauditing.blogspot.com\/2010\/08\/five-phases-of-investigation.html<\/a><\/p>\n<p><a href=\"http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-86.pdf\">http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-86.pdf<\/a> (Section 3)<\/p>\n<p><strong>Required Viewing found here<\/strong><br \/>\nApplying science to digital investigations<\/p>\n<p><u>Understanding Forensic Science <\/u><a href=\"https:\/\/www.lynda.com\/Security-tutorials\/Applying-science-digital-investigations\/419360\/455990-4.html\">https:\/\/www.lynda.com\/Security-tutorials\/Applying-science-digital-investigations\/419360\/455990-4.html<\/a><\/p>\n<ul>\n<li>Applying Science to digital investigations<\/li>\n<li>Identifying digital evidence<\/li>\n<li>Destroying digital evidence<\/li>\n<li>Using forensic best practices<\/li>\n<li>Examining forensic frameworks<\/li>\n<li>Ensuring Scientific relevance<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>What is Forensics? Stages of examination Seizure, Acquisition, Analysis and Reporting NIST \u2013 Collection, Examination, Analysis, Reporting Topics and Required Reading https:\/\/forensiccontrol.com\/resources\/beginners-guide-computer-forensics\/ http:\/\/forensicandinvestigativeauditing.blogspot.com\/2010\/08\/five-phases-of-investigation.html http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-86.pdf (Section 3) Required Viewing found here Applying science to digital investigations Understanding Forensic Science https:\/\/www.lynda.com\/Security-tutorials\/Applying-science-digital-investigations\/419360\/455990-4.html Applying Science to digital investigations Identifying digital evidence Destroying digital evidence Using forensic best practices Examining [&hellip;]<\/p>\n","protected":false},"author":1207,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-2417","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/pages\/2417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/users\/1207"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/comments?post=2417"}],"version-history":[{"count":6,"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/pages\/2417\/revisions"}],"predecessor-version":[{"id":3059,"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/pages\/2417\/revisions\/3059"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5170sec002sp2017\/wp-json\/wp\/v2\/media?parent=2417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}