Describe the role of cyber forensics examiners and unique factors to keep in mind when collecting evidence at a scene. As a cyber investigator, create your investigative environment. Install the VM or Sandbox of your choice, and then create an encrypted container for the storage of your case work. Install or run your anonymization service (VPN or TOR) within your VM/Sandbox and preserve a webpage of your choosing (preserve webpage, find domain owner, file metadata, IP address, etc.). Generate a word document to include screenshots of each action. Describe what tools you are using and why you choose that particular tool.

4 comments on “The role of cyber forensics examiners

  1. Pingback: visit here

Leave a Reply

Your email address will not be published. Required fields are marked *