{"id":187,"date":"2026-04-13T15:28:00","date_gmt":"2026-04-13T15:28:00","guid":{"rendered":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/?post_type=chapter&#038;p=187"},"modified":"2026-04-13T15:29:30","modified_gmt":"2026-04-13T15:29:30","slug":"module-7-scenario-digital-forensic-analyst","status":"publish","type":"chapter","link":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/chapter\/module-7-scenario-digital-forensic-analyst\/","title":{"raw":"Module 7: Scenario - Digital Forensic Analyst","rendered":"Module 7: Scenario &#8211; Digital Forensic Analyst"},"content":{"raw":"<h2>Digital Forensics, Cybersecurity, and Data-Driven Investigations<\/h2>\r\n<h3>Chapter Overview<\/h3>\r\nDigital forensics is the process of collecting, analyzing, and reporting digital evidence in support of investigations. As cybercrime continues to grow, organizations rely on digital forensic analysts to investigate data breaches, recover evidence, and support legal proceedings.\r\n\r\nIn this chapter, you will explore how computing, data analysis, artificial intelligence, and Microsoft 365 tools are used in cybersecurity investigations. You will step into the role of a <strong>Digital Forensic Analyst<\/strong> and examine how digital evidence is collected, analyzed, and presented in a professional and ethical manner.\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<h3 class=\"textbox__title\">Learning Objectives<\/h3>\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>Describe the role of a digital forensic analyst in cybersecurity investigations.<\/li>\r\n \t<li>Explain how computing supports crime detection and digital evidence analysis.<\/li>\r\n \t<li>Identify types of digital evidence used in forensic investigations.<\/li>\r\n \t<li>Explain how artificial intelligence supports threat detection and analysis.<\/li>\r\n \t<li>Describe how data systems support collaboration and intelligence sharing.<\/li>\r\n \t<li>Identify how Microsoft 365 tools are used in forensic workflows.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<h3 class=\"textbox__title\">Key Terms<\/h3>\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li><strong>Digital Forensics<\/strong> \u2013 The process of identifying, preserving, analyzing, and presenting digital evidence.<\/li>\r\n \t<li><strong>Cybercrime<\/strong> \u2013 Criminal activity that involves computers, networks, or digital systems.<\/li>\r\n \t<li><strong>Data Breach<\/strong> \u2013 Unauthorized access to confidential or sensitive information.<\/li>\r\n \t<li><strong>Chain of Custody<\/strong> \u2013 Documentation that tracks evidence handling to ensure integrity.<\/li>\r\n \t<li><strong>Encryption<\/strong> \u2013 The process of encoding data to protect it from unauthorized access.<\/li>\r\n \t<li><strong>Predictive Analytics<\/strong> \u2013 Using data to forecast potential outcomes or threats.<\/li>\r\n \t<li><strong>Anomaly Detection<\/strong> \u2013 Identifying unusual patterns that may indicate security threats.<\/li>\r\n \t<li><strong>Digital Evidence<\/strong> \u2013 Information stored or transmitted in digital form used in investigations.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<h3>The Role of Digital Forensics in a Technology-Driven World<\/h3>\r\nDigital forensic analysts investigate cyber incidents by collecting and analyzing digital evidence. Their work supports law enforcement, cybersecurity teams, and legal proceedings.\r\n<ul>\r\n \t<li><strong>Why these roles matter:<\/strong> Cybercrime affects businesses, governments, and individuals worldwide.<\/li>\r\n \t<li><strong>Career outlook:<\/strong> Demand is growing as digital systems become more central to daily life.<\/li>\r\n \t<li><strong>Technology connection:<\/strong> Analysts rely on computing tools to trace digital activity and recover evidence.<\/li>\r\n<\/ul>\r\nModern investigations depend on technology to analyze large datasets, detect threats, and ensure evidence is handled securely and ethically.\r\n<h3>Scenario: Investigating a Data Breach<\/h3>\r\nYou are a <strong>Digital Forensic Analyst<\/strong> working for a cybersecurity investigation team. Your task is to investigate a suspected data breach at a company.\r\n\r\nYour responsibilities include collecting digital evidence, analyzing system activity, documenting findings, and presenting results to investigators and legal teams. You must complete each stage of the investigation using Microsoft 365 tools in a professional and organized manner.\r\n<h3>Disciplines Involved<\/h3>\r\n<ul>\r\n \t<li>Criminology<\/li>\r\n \t<li>Psychology<\/li>\r\n \t<li>Intelligence Analysis<\/li>\r\n \t<li>Cybersecurity<\/li>\r\n \t<li>Data Science<\/li>\r\n<\/ul>\r\n<h3>Advanced Data Analysis for Crime Prevention<\/h3>\r\nModern computing allows analysts to examine large datasets such as criminal records, social media activity, and geolocation data.\r\n<ul>\r\n \t<li>identify patterns in criminal behavior<\/li>\r\n \t<li>predict potential threats<\/li>\r\n \t<li>support proactive law enforcement strategies<\/li>\r\n<\/ul>\r\nThese capabilities improve efficiency and help prevent incidents before they occur.\r\n<h3>Cybercrime and Digital Forensics<\/h3>\r\nDigital forensic analysts use computing tools to investigate cybercrime and security incidents.\r\n<ul>\r\n \t<li>trace digital footprints across devices and networks<\/li>\r\n \t<li>recover deleted or encrypted data<\/li>\r\n \t<li>analyze system logs and network activity<\/li>\r\n<\/ul>\r\nThis work is essential for protecting organizations from financial loss, identity theft, and data compromise.\r\n<h3>AI-Powered Surveillance and Threat Detection<\/h3>\r\nArtificial intelligence supports security and forensic investigations by identifying patterns and unusual behavior.\r\n<ul>\r\n \t<li><strong>Facial recognition:<\/strong> Identify individuals in surveillance systems.<\/li>\r\n \t<li><strong>Anomaly detection:<\/strong> Detect unusual activity in systems or networks.<\/li>\r\n \t<li><strong>Pattern recognition:<\/strong> Identify trends in criminal or suspicious behavior.<\/li>\r\n<\/ul>\r\nThese tools improve detection speed and accuracy while supporting public safety and cybersecurity.\r\n<h3>Real-Time Intelligence Sharing<\/h3>\r\nCloud computing and secure systems allow agencies to share information instantly across jurisdictions.\r\n<ul>\r\n \t<li>coordinate investigations between agencies<\/li>\r\n \t<li>share evidence securely<\/li>\r\n \t<li>respond more quickly to threats<\/li>\r\n<\/ul>\r\nThis collaboration improves investigation outcomes and strengthens security efforts.\r\n<h3>Predictive Analytics and Resource Optimization<\/h3>\r\nMachine learning models analyze historical data to predict future trends.\r\n<ul>\r\n \t<li>identify crime hotspots<\/li>\r\n \t<li>allocate resources efficiently<\/li>\r\n \t<li>reduce response times<\/li>\r\n<\/ul>\r\nThese tools support more effective and efficient use of personnel and resources.\r\n<h3>Enhanced Decision-Making<\/h3>\r\nComputing systems provide dashboards and simulations that help leaders evaluate scenarios and make informed decisions during investigations and emergencies.\r\n<h3>How Computing Has Transformed Digital Forensics Careers<\/h3>\r\nModern computing enables faster, more accurate investigations by supporting data analysis, predictive modeling, and real-time monitoring. AI enhances these capabilities by identifying patterns and automating parts of the investigative process.\r\n\r\nAs a result, computing skills are essential for professionals working in cybersecurity and digital forensics.\r\n<h3>History of Data Processing in Digital Forensics<\/h3>\r\nEarly investigations relied on manual record-keeping and paper files. Over time, computers enabled faster storage and retrieval of information. Networked systems allowed agencies to share data more efficiently.\r\n\r\nToday, advanced computing supports large-scale data analysis, biometric identification, and AI-driven investigations.\r\n<h3>Artificial Intelligence and Machine Learning in Forensics<\/h3>\r\nAI and machine learning play a growing role in digital investigations.\r\n<ul>\r\n \t<li><strong>Model training:<\/strong> High-performance computing enables complex algorithm development.<\/li>\r\n \t<li><strong>Cloud deployment:<\/strong> Systems can scale to analyze large datasets.<\/li>\r\n \t<li><strong>Automated analysis:<\/strong> AI identifies patterns to improve accuracy.<\/li>\r\n<\/ul>\r\nThese technologies support faster investigations and improved threat detection.\r\n<h3>Using Microsoft 365 Tools in Digital Forensics<\/h3>\r\n<h3>Microsoft Word: Reporting and Documentation<\/h3>\r\n<ul>\r\n \t<li>Draft incident and investigation reports<\/li>\r\n \t<li>Create chain-of-custody documentation<\/li>\r\n \t<li>Write expert witness statements<\/li>\r\n \t<li>Develop standard operating procedures<\/li>\r\n<\/ul>\r\n<h3>Microsoft Excel: Data Analysis<\/h3>\r\n<ul>\r\n \t<li>Organize evidence logs and timestamps<\/li>\r\n \t<li>Analyze case data and trends<\/li>\r\n \t<li>Create charts and visualizations<\/li>\r\n<\/ul>\r\n<h3>Microsoft Access: Database Management<\/h3>\r\n<ul>\r\n \t<li>Build case management databases<\/li>\r\n \t<li>Store evidence and investigation records<\/li>\r\n \t<li>Query relationships between suspects and evidence<\/li>\r\n<\/ul>\r\n<h3>Microsoft PowerPoint: Communication<\/h3>\r\n<ul>\r\n \t<li>Present findings to investigators or legal teams<\/li>\r\n \t<li>Create visual timelines of events<\/li>\r\n \t<li>Develop training materials<\/li>\r\n<\/ul>\r\n<h3>Microsoft Copilot: AI Assistance<\/h3>\r\n<h4>In Word<\/h4>\r\n<ul>\r\n \t<li>Summarize case files and reports<\/li>\r\n \t<li>Draft structured investigation documents<\/li>\r\n<\/ul>\r\n<h4>In Excel<\/h4>\r\n<ul>\r\n \t<li>Generate charts and identify patterns<\/li>\r\n \t<li>Analyze large datasets quickly<\/li>\r\n<\/ul>\r\n<h4>In Access<\/h4>\r\n<ul>\r\n \t<li>Suggest queries to find relevant evidence<\/li>\r\n<\/ul>\r\n<h4>In PowerPoint<\/h4>\r\n<ul>\r\n \t<li>Create presentation outlines<\/li>\r\n<\/ul>\r\n<h4>General Tasks<\/h4>\r\n<ul>\r\n \t<li>Improve efficiency in reporting and analysis<\/li>\r\n \t<li>Support data-driven investigations<\/li>\r\n<\/ul>\r\n<h3>Ethics and Legal Responsibility<\/h3>\r\nDigital forensic analysts must follow strict legal and ethical guidelines when handling evidence. Maintaining chain of custody, protecting privacy, and ensuring accuracy are critical to successful investigations.\r\n<h3>Chapter Summary<\/h3>\r\nDigital forensic analysts use computing, data analysis, and AI to investigate cyber incidents and support legal processes. These professionals play a critical role in protecting organizations and individuals from digital threats.\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<h3 class=\"textbox__title\">Key Takeaways<\/h3>\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>Digital forensics focuses on analyzing and preserving digital evidence.<\/li>\r\n \t<li>Computing tools support cybersecurity investigations.<\/li>\r\n \t<li>AI improves threat detection and analysis.<\/li>\r\n \t<li>Cloud systems enable real-time collaboration.<\/li>\r\n \t<li>Microsoft 365 tools support documentation, analysis, and communication.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<h3>Review Questions<\/h3>\r\n<ol>\r\n \t<li>What is the role of a digital forensic analyst?<\/li>\r\n \t<li>How does computing support cybercrime investigations?<\/li>\r\n \t<li>What types of digital evidence are used in investigations?<\/li>\r\n \t<li>How does AI improve threat detection?<\/li>\r\n \t<li>Why is chain of custody important?<\/li>\r\n<\/ol>\r\n<h3>Practice Activity<\/h3>\r\n<strong>Apply the Role:<\/strong> Imagine you are investigating a company data breach.\r\n<ol>\r\n \t<li>Identify three types of digital evidence you would collect.<\/li>\r\n \t<li>Explain how Excel could help analyze the data.<\/li>\r\n \t<li>Describe how you would document findings in Word.<\/li>\r\n \t<li>Suggest how AI could assist your investigation.<\/li>\r\n \t<li>Explain why ethical handling of data is important.<\/li>\r\n<\/ol>\r\n<h3>Further Reflection<\/h3>\r\nCybersecurity and digital investigations affect individuals and organizations worldwide. Which technology discussed in this chapter do you think is most important for preventing cybercrime, and why?\r\n<h3>Further Reading and Resources<\/h3>\r\n<ul>\r\n \t<li><a href=\"https:\/\/www.cisa.gov\/\">Cybersecurity and Infrastructure Security Agency<\/a><\/li>\r\n \t<li><a href=\"https:\/\/www.nist.gov\/cyberframework\">NIST Cybersecurity Framework<\/a><\/li>\r\n \t<li><a href=\"https:\/\/www.interpol.int\/\">INTERPOL Cybercrime Resources<\/a><\/li>\r\n \t<li><a href=\"https:\/\/www.fbi.gov\/investigate\/cyber\">FBI Cyber Crime Division<\/a><\/li>\r\n<\/ul>\r\n<div class=\"textbox\">\r\n<h3>Attribution<\/h3>\r\nThis educational material includes AI-generated content from ChatGPT by OpenAI and Copilot from Microsoft. The original content created by Shelley Stewart and Andy Seeley from Hillsborough College is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (<a href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\">CC BY-NC 4.0<\/a>).\r\n\r\nAny images added to this textbook that were generated with DALL\u00b7E or the Microsoft Copilot Image Generator are licensed under the terms provided by OpenAI and Microsoft, which allow for their use, modification, and distribution with appropriate attribution.\r\n\r\n<\/div>","rendered":"<h2>Digital Forensics, Cybersecurity, and Data-Driven Investigations<\/h2>\n<h3>Chapter Overview<\/h3>\n<p>Digital forensics is the process of collecting, analyzing, and reporting digital evidence in support of investigations. As cybercrime continues to grow, organizations rely on digital forensic analysts to investigate data breaches, recover evidence, and support legal proceedings.<\/p>\n<p>In this chapter, you will explore how computing, data analysis, artificial intelligence, and Microsoft 365 tools are used in cybersecurity investigations. You will step into the role of a <strong>Digital Forensic Analyst<\/strong> and examine how digital evidence is collected, analyzed, and presented in a professional and ethical manner.<\/p>\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<h3 class=\"textbox__title\">Learning Objectives<\/h3>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Describe the role of a digital forensic analyst in cybersecurity investigations.<\/li>\n<li>Explain how computing supports crime detection and digital evidence analysis.<\/li>\n<li>Identify types of digital evidence used in forensic investigations.<\/li>\n<li>Explain how artificial intelligence supports threat detection and analysis.<\/li>\n<li>Describe how data systems support collaboration and intelligence sharing.<\/li>\n<li>Identify how Microsoft 365 tools are used in forensic workflows.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<h3 class=\"textbox__title\">Key Terms<\/h3>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li><strong>Digital Forensics<\/strong> \u2013 The process of identifying, preserving, analyzing, and presenting digital evidence.<\/li>\n<li><strong>Cybercrime<\/strong> \u2013 Criminal activity that involves computers, networks, or digital systems.<\/li>\n<li><strong>Data Breach<\/strong> \u2013 Unauthorized access to confidential or sensitive information.<\/li>\n<li><strong>Chain of Custody<\/strong> \u2013 Documentation that tracks evidence handling to ensure integrity.<\/li>\n<li><strong>Encryption<\/strong> \u2013 The process of encoding data to protect it from unauthorized access.<\/li>\n<li><strong>Predictive Analytics<\/strong> \u2013 Using data to forecast potential outcomes or threats.<\/li>\n<li><strong>Anomaly Detection<\/strong> \u2013 Identifying unusual patterns that may indicate security threats.<\/li>\n<li><strong>Digital Evidence<\/strong> \u2013 Information stored or transmitted in digital form used in investigations.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<h3>The Role of Digital Forensics in a Technology-Driven World<\/h3>\n<p>Digital forensic analysts investigate cyber incidents by collecting and analyzing digital evidence. Their work supports law enforcement, cybersecurity teams, and legal proceedings.<\/p>\n<ul>\n<li><strong>Why these roles matter:<\/strong> Cybercrime affects businesses, governments, and individuals worldwide.<\/li>\n<li><strong>Career outlook:<\/strong> Demand is growing as digital systems become more central to daily life.<\/li>\n<li><strong>Technology connection:<\/strong> Analysts rely on computing tools to trace digital activity and recover evidence.<\/li>\n<\/ul>\n<p>Modern investigations depend on technology to analyze large datasets, detect threats, and ensure evidence is handled securely and ethically.<\/p>\n<h3>Scenario: Investigating a Data Breach<\/h3>\n<p>You are a <strong>Digital Forensic Analyst<\/strong> working for a cybersecurity investigation team. Your task is to investigate a suspected data breach at a company.<\/p>\n<p>Your responsibilities include collecting digital evidence, analyzing system activity, documenting findings, and presenting results to investigators and legal teams. You must complete each stage of the investigation using Microsoft 365 tools in a professional and organized manner.<\/p>\n<h3>Disciplines Involved<\/h3>\n<ul>\n<li>Criminology<\/li>\n<li>Psychology<\/li>\n<li>Intelligence Analysis<\/li>\n<li>Cybersecurity<\/li>\n<li>Data Science<\/li>\n<\/ul>\n<h3>Advanced Data Analysis for Crime Prevention<\/h3>\n<p>Modern computing allows analysts to examine large datasets such as criminal records, social media activity, and geolocation data.<\/p>\n<ul>\n<li>identify patterns in criminal behavior<\/li>\n<li>predict potential threats<\/li>\n<li>support proactive law enforcement strategies<\/li>\n<\/ul>\n<p>These capabilities improve efficiency and help prevent incidents before they occur.<\/p>\n<h3>Cybercrime and Digital Forensics<\/h3>\n<p>Digital forensic analysts use computing tools to investigate cybercrime and security incidents.<\/p>\n<ul>\n<li>trace digital footprints across devices and networks<\/li>\n<li>recover deleted or encrypted data<\/li>\n<li>analyze system logs and network activity<\/li>\n<\/ul>\n<p>This work is essential for protecting organizations from financial loss, identity theft, and data compromise.<\/p>\n<h3>AI-Powered Surveillance and Threat Detection<\/h3>\n<p>Artificial intelligence supports security and forensic investigations by identifying patterns and unusual behavior.<\/p>\n<ul>\n<li><strong>Facial recognition:<\/strong> Identify individuals in surveillance systems.<\/li>\n<li><strong>Anomaly detection:<\/strong> Detect unusual activity in systems or networks.<\/li>\n<li><strong>Pattern recognition:<\/strong> Identify trends in criminal or suspicious behavior.<\/li>\n<\/ul>\n<p>These tools improve detection speed and accuracy while supporting public safety and cybersecurity.<\/p>\n<h3>Real-Time Intelligence Sharing<\/h3>\n<p>Cloud computing and secure systems allow agencies to share information instantly across jurisdictions.<\/p>\n<ul>\n<li>coordinate investigations between agencies<\/li>\n<li>share evidence securely<\/li>\n<li>respond more quickly to threats<\/li>\n<\/ul>\n<p>This collaboration improves investigation outcomes and strengthens security efforts.<\/p>\n<h3>Predictive Analytics and Resource Optimization<\/h3>\n<p>Machine learning models analyze historical data to predict future trends.<\/p>\n<ul>\n<li>identify crime hotspots<\/li>\n<li>allocate resources efficiently<\/li>\n<li>reduce response times<\/li>\n<\/ul>\n<p>These tools support more effective and efficient use of personnel and resources.<\/p>\n<h3>Enhanced Decision-Making<\/h3>\n<p>Computing systems provide dashboards and simulations that help leaders evaluate scenarios and make informed decisions during investigations and emergencies.<\/p>\n<h3>How Computing Has Transformed Digital Forensics Careers<\/h3>\n<p>Modern computing enables faster, more accurate investigations by supporting data analysis, predictive modeling, and real-time monitoring. AI enhances these capabilities by identifying patterns and automating parts of the investigative process.<\/p>\n<p>As a result, computing skills are essential for professionals working in cybersecurity and digital forensics.<\/p>\n<h3>History of Data Processing in Digital Forensics<\/h3>\n<p>Early investigations relied on manual record-keeping and paper files. Over time, computers enabled faster storage and retrieval of information. Networked systems allowed agencies to share data more efficiently.<\/p>\n<p>Today, advanced computing supports large-scale data analysis, biometric identification, and AI-driven investigations.<\/p>\n<h3>Artificial Intelligence and Machine Learning in Forensics<\/h3>\n<p>AI and machine learning play a growing role in digital investigations.<\/p>\n<ul>\n<li><strong>Model training:<\/strong> High-performance computing enables complex algorithm development.<\/li>\n<li><strong>Cloud deployment:<\/strong> Systems can scale to analyze large datasets.<\/li>\n<li><strong>Automated analysis:<\/strong> AI identifies patterns to improve accuracy.<\/li>\n<\/ul>\n<p>These technologies support faster investigations and improved threat detection.<\/p>\n<h3>Using Microsoft 365 Tools in Digital Forensics<\/h3>\n<h3>Microsoft Word: Reporting and Documentation<\/h3>\n<ul>\n<li>Draft incident and investigation reports<\/li>\n<li>Create chain-of-custody documentation<\/li>\n<li>Write expert witness statements<\/li>\n<li>Develop standard operating procedures<\/li>\n<\/ul>\n<h3>Microsoft Excel: Data Analysis<\/h3>\n<ul>\n<li>Organize evidence logs and timestamps<\/li>\n<li>Analyze case data and trends<\/li>\n<li>Create charts and visualizations<\/li>\n<\/ul>\n<h3>Microsoft Access: Database Management<\/h3>\n<ul>\n<li>Build case management databases<\/li>\n<li>Store evidence and investigation records<\/li>\n<li>Query relationships between suspects and evidence<\/li>\n<\/ul>\n<h3>Microsoft PowerPoint: Communication<\/h3>\n<ul>\n<li>Present findings to investigators or legal teams<\/li>\n<li>Create visual timelines of events<\/li>\n<li>Develop training materials<\/li>\n<\/ul>\n<h3>Microsoft Copilot: AI Assistance<\/h3>\n<h4>In Word<\/h4>\n<ul>\n<li>Summarize case files and reports<\/li>\n<li>Draft structured investigation documents<\/li>\n<\/ul>\n<h4>In Excel<\/h4>\n<ul>\n<li>Generate charts and identify patterns<\/li>\n<li>Analyze large datasets quickly<\/li>\n<\/ul>\n<h4>In Access<\/h4>\n<ul>\n<li>Suggest queries to find relevant evidence<\/li>\n<\/ul>\n<h4>In PowerPoint<\/h4>\n<ul>\n<li>Create presentation outlines<\/li>\n<\/ul>\n<h4>General Tasks<\/h4>\n<ul>\n<li>Improve efficiency in reporting and analysis<\/li>\n<li>Support data-driven investigations<\/li>\n<\/ul>\n<h3>Ethics and Legal Responsibility<\/h3>\n<p>Digital forensic analysts must follow strict legal and ethical guidelines when handling evidence. Maintaining chain of custody, protecting privacy, and ensuring accuracy are critical to successful investigations.<\/p>\n<h3>Chapter Summary<\/h3>\n<p>Digital forensic analysts use computing, data analysis, and AI to investigate cyber incidents and support legal processes. These professionals play a critical role in protecting organizations and individuals from digital threats.<\/p>\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<h3 class=\"textbox__title\">Key Takeaways<\/h3>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Digital forensics focuses on analyzing and preserving digital evidence.<\/li>\n<li>Computing tools support cybersecurity investigations.<\/li>\n<li>AI improves threat detection and analysis.<\/li>\n<li>Cloud systems enable real-time collaboration.<\/li>\n<li>Microsoft 365 tools support documentation, analysis, and communication.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<h3>Review Questions<\/h3>\n<ol>\n<li>What is the role of a digital forensic analyst?<\/li>\n<li>How does computing support cybercrime investigations?<\/li>\n<li>What types of digital evidence are used in investigations?<\/li>\n<li>How does AI improve threat detection?<\/li>\n<li>Why is chain of custody important?<\/li>\n<\/ol>\n<h3>Practice Activity<\/h3>\n<p><strong>Apply the Role:<\/strong> Imagine you are investigating a company data breach.<\/p>\n<ol>\n<li>Identify three types of digital evidence you would collect.<\/li>\n<li>Explain how Excel could help analyze the data.<\/li>\n<li>Describe how you would document findings in Word.<\/li>\n<li>Suggest how AI could assist your investigation.<\/li>\n<li>Explain why ethical handling of data is important.<\/li>\n<\/ol>\n<h3>Further Reflection<\/h3>\n<p>Cybersecurity and digital investigations affect individuals and organizations worldwide. Which technology discussed in this chapter do you think is most important for preventing cybercrime, and why?<\/p>\n<h3>Further Reading and Resources<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.cisa.gov\/\">Cybersecurity and Infrastructure Security Agency<\/a><\/li>\n<li><a href=\"https:\/\/www.nist.gov\/cyberframework\">NIST Cybersecurity Framework<\/a><\/li>\n<li><a href=\"https:\/\/www.interpol.int\/\">INTERPOL Cybercrime Resources<\/a><\/li>\n<li><a href=\"https:\/\/www.fbi.gov\/investigate\/cyber\">FBI Cyber Crime Division<\/a><\/li>\n<\/ul>\n<div class=\"textbox\">\n<h3>Attribution<\/h3>\n<p>This educational material includes AI-generated content from ChatGPT by OpenAI and Copilot from Microsoft. The original content created by Shelley Stewart and Andy Seeley from Hillsborough College is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (<a href=\"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/deed.en\">CC BY-NC 4.0<\/a>).<\/p>\n<p>Any images added to this textbook that were generated with DALL\u00b7E or the Microsoft Copilot Image Generator are licensed under the terms provided by OpenAI and Microsoft, which allow for their use, modification, and distribution with appropriate attribution.<\/p>\n<\/div>\n","protected":false},"author":2,"menu_order":9,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-187","chapter","type-chapter","status-publish","hentry"],"part":3,"_links":{"self":[{"href":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/wp-json\/pressbooks\/v2\/chapters\/187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":3,"href":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/wp-json\/pressbooks\/v2\/chapters\/187\/revisions"}],"predecessor-version":[{"id":193,"href":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/wp-json\/pressbooks\/v2\/chapters\/187\/revisions\/193"}],"part":[{"href":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/wp-json\/pressbooks\/v2\/parts\/3"}],"metadata":[{"href":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/wp-json\/pressbooks\/v2\/chapters\/187\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/wp-json\/wp\/v2\/media?parent=187"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/wp-json\/pressbooks\/v2\/chapter-type?post=187"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/wp-json\/wp\/v2\/contributor?post=187"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.hcfl.edu\/compinfotechlit\/wp-json\/wp\/v2\/license?post=187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}