EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 13 : Investigating Email Crimes
         
Notes available : 7 You are not logged in.
Please Login for track your learning progress
   
 
Sl.No: 1 | 2 | 3 | 4 | 5 | 6 | 7 |
Go to Note No.



Bookmark this Note
Note ID: 156

Acquiring the email data


If you want to share the link of this note, please click here to "Copy note link" and share that generated link. Link from URL may change in future.
 


  1. The next step is to acquire the email data for forensic analysis.The acquisition of email data depends on the following scenarios: i) The suspect has been accessing emails via desktop-based email clients such as Outlook and Mozilla Thunderbird. ii) . The suspect has a web-based email account that they accessed via the browser The investigator needs to choose the acquisition process as per the situation in the crime scene.
  2. Examining email messages.
  3. Retrieving email headers.
  4. Analyzing email headers.
  5. Recovering deleted email messages.


  Go to notes  






WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations