The digital (computer) forensics process: Identify the potential evidence, acquire the evidence,
analyze the evidence, make a report. We need to be more aware of how we gather our forensic
evidence, attackers are covering their tracks, deleting the evidence and logs.