EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 2 : Computer Forensics Investigation Process
         
Notes available : 7 You are not logged in.
Please Login for track your learning progress
   
 
Sl.No: 1 | 2 | 3 | 4 | 5 | 6 | 7 |
Go to Note No.



Bookmark this Note
Note ID: 151

Evidence Reconstruction


If you want to share the link of this note, please click here to "Copy note link" and share that generated link. Link from URL may change in future.
 


Once the evidence related to the case is analyzed, investigators can use it to reconstruct the crime and identify the missing links. There are three ways, in which investigators can reconstruct a crime:

Temporal analysis: It produces a sequential event trail, which sheds light on important factors such as what happened and who was involved.

Relational analysis: It correlates the actions of suspect and victim.

Functional analysis: It provides a description of the possible conditions of a crime. It testifies to the events responsible for a crime in relation to their functionalities.



  Go to notes  






WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations