Print Friendly, PDF & Email

The process of collecting electronic data can be a complicated one in e-discovery or computer forensic investigation. This can be attributed to the vast amount of data, different electronic storage locations and also the increasing file-types used. It is important to note that the initial data collections steps are very vital part of the process. Should errors occur; the process can be very costly in the investigation or in terms of cost? Therefore before the process of data collection begins, there is a need for experts to examine the type of data that is very crucial, where it is located, the amount needed and also whether active data or mirror image capture is needed. In this article, we explore the various differences between active data capture and mirror image capture.

Mirror Imaging

After identifying the location of the relevant data, the data must be retrieved. Computer forensic and data experts can be able to retrieve data that is in all operating and storage systems. This can include the antiquated systems. No matter how the data is collected, a forensic copy of the media can be made by the use of the appropriate and effective software. Therefore the imaging process can offer investigators and clients a complete mirror image, or snapshot, of the deleted, active, and also partially overwritten data that is contained in the media. It also ensures that there are no alterations that can be made to the original data.

It is important to note that the imaging process does not destroy data in any way and neither does it require an operating system to be booted. This ensures that the system will not be altered in any way in the imaging process and thus preserves the evidentiary value. Many IT professionals and lawyers are not aware of the booting process of a computer as it damages the critical evidence and also it is likely to change the metadata, such as modified dates or created dates that are associated with given files. Also, the process of booting can cause problems to the hard drives of the system being used.

Previous articleCommon Methods Used in Web Scraping
Next articleCreation of Data Warehouses by Web Scraping
Welcome to Loginworks! Our team of technical writers works extensively to share their knowledge with the outer world. Our professional writers deliver first-class business communication and technical writing to go extra mile for their readers. We believe great writing and knowledge sharing is essential for growth of every business. Thus, we timely publish blogs on the new technologies, their related problems, their solutions, reviews, comparison, and pricing. This helps our readers to get the better understanding of the technologies and their benefits. For the everyday updates on technologies keep visiting to our blog.