Collection: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (One intermediate revision by the same user not shown) | |
(No difference)
| |
Latest revision as of 00:24, 20 January 2026
Collection
The first phase of the computer and network forensics process, which involves identifying, labeling, recording, and acquiring data from the possible sources of relevant data, while following guidelines and procedures that preserve the integrity of the data.
Source: NIST SP 800-86 | Category: