McAfee Institute

View all posts
  • computerpo

    This the actual mechanics of collecting and maintaining online ESI and goes
    to the heart of chain of custody issues. Select collection method that
    saves online ESI in a manner that helps document it… Some programs allow
    you to save online ESI with the time/date of the collecting in the file
    name. Must be able to report/document how online ESI collected: Method;
    Date/time; From where (website, blog, social networking site, file sharing
    interface, etc.). Should also hash online ESI files after collection so
    that you can say it was not altered after collection. For details check
    out Investigating Internet Crimes: An Introduction to Solving Crimes in
    Cyberspace https://www.amazon.com/dp/0124078176/ref=rdr_ext_tmb