Summary
In this chapter, we covered some IRCDs and discussed the live acquisition using IRCDs and FTK Imager and imaging over the network using IRCDs and the dd
tool. We also viewed how to preserve evidence integrity and how to wipe a disk for forensic usage.
In the next chapter, we will discuss how to create a timeline of the system activities and why it is important from a digital forensics prospective.