Get Your Data from the Computer System
we will be discussing a technique for how to create forensic image authentication. This technique has the ability to produce an authentic forensic image and keep it from being edited or altered after it has been created.
An adversary could go through many different steps to manipulate the forensic image data, but by using this method it is possible to detect any manipulations that have taken place.
Step 1: Get Your Data from the Computer System
To create a forensic image authentication, you need your computer system data before you start the process of creating an authentic one. A computer system usually contains certain data that should be exported before proceeding with creating your authentic forensic images. This data can either be persistent or volatile depending on what type of system it is running on and what type of work is being done.