This document provides an overview of evidence collection and forensics tools. It discusses processing crime scenes, securing computer systems, and preserving digital evidence. The key points covered are:
1) When responding to an incident, investigators must properly process the scene, bag and tag all evidence, and document their activities to preserve the integrity of the evidence.
2) Securing a computer scene involves defining a perimeter, photographing the area, taking custody of systems and media, and using logs to track the chain of custody.
3) Preserving digital evidence means capturing volatile data from live systems, creating forensic images of storage devices to avoid modifying the original data, and storing the information securely.