Digital forensics involves investigating computer security incidents by answering questions about who, what, when, where, why and how. A typical investigation has four phases: acquisition of evidence without altering it, recovery of data from copies of the evidence, analysis to locate contraband, reconstruct events or determine compromise, and presentation of findings. Challenges include massive data volumes, limited system logging, unknown files and attributing authorship. Standards, better tools, more research and documentation are needed as digital evidence becomes more central to investigations.