Computer Forensics Methodologies List them and explain each one. Pick one of the methodologies and describe What tools could you use for what situations. Procedures that you would follow. Types of documentation you would need to keep. Would it need to be done in a mobile lab or not? Why? Solution Computer forensics investigation is important now days, it is the term used to describe the process of investigation, analyze data, and evidance as per the stored information with us. There are few steps we need to follwed it:- First we have to acquire the evidance without loosing or damaging data. Second is make authentiacation on data which you have collected in first step. And third one is analyze your data. Following are the phases for computer forensics investigations:- Identification Case: Identify the exact information which we gathered for investigation purpose.Ask yourself while anyalyzing information like, who is the criminal, when it happen, what was the intention behind that? Acquisition of evidence:- Acquisition is to put to execution the acquisition plan designed in the earlier phase that is the identification. The aim of the acquisition phase is to obtain forensics copies of all the digital evidence/data that will be required during the next stage which is the Analysis Phase. In the actual acquisition, procedures are focused primarily on maintaining proper forensics techniques to ensure that any evidence acquired will be acceptable to the legal proceeding and can be duplicated and if necessary should be done by an independent third party. There are different scanario which shoud be consider in this case:- Environment Documentation and procedural documentation. Hardware and sofware tools documentation. Evidance proof of documetation. Etc. Evidence authentication:- Use different security alogothm used in computer science for anaylzing data like md5, sha1 etc. Check recording or any physical proof at the time of situation and analyze it. Check for fingerproof if any case it is major source to finding case in minimum time. Showing Proof as per Analysis:- Make final documenation as per your study, or analysis over the case. So it is easy for the someone who tooks decision what is right and what is wrong. Whatever you are presenting it should collected by yourself it menace you shold aware why we present this documents here. All document s which we are showing should be complete, accurate, and comprehensive It is important to accurately record the steps taken during the digital evidence examination along with all the needed details necessary for a third party examiner to reproduce and validate every piece of evidence..