The digital (computer) forensics process: We need to be more aware of how we gather our forensic
evidence, attackers are covering their tracks, deleting the evidence and logs. This can be through
malware that is only in volatile memory, if power is shut off (to preserve the crime scene), the
malware is gone and the evidence is lost.