What are 4 different sources of data which could be used in a digital forensics investigation
compare challenges regarding collecting and examining the different sources.
Prioritizing them according to their potential usefulness with regards to three different events:
1. Network intrusion
2. Malware installation
3. Insider file deletion.