Abstract:
The research was conducted on basis of open sourced information. The analysis was carried out according to the following criteria: importance, usage, real incidents, danger. I investigated complexion of the procedures and significance. I analyzed different parts of computer forensics and found out how investigations are conducted, how to work with incidents and what steps are taken.