
375
Appendix J
Cyber Forensic Best Practice
Recommendations
e following recommendations may be looked at as best practices in the performance of a cyber
forensic investigation. e term best practice generally refers to the best possible way of doing
something; it is commonly used in the fi elds of business management, software engineering,
medicine, and government. Now we can add cyber forensics to this list.
ese recommendations have been taken from the National Institute of Standards and
Technology (www.nist.gov), Special Publication 800-86, Guide to Integrating Forensic Techniques
into Incident Response, [www.csrc.nist.gov/publications