The document discusses how the internet and forensic science intersect in several areas. It describes how the internet works as a network of networks that connects computers worldwide. Information can be exchanged via the world wide web, email, internet caching, cookies, browsing history, bookmarks and various online communication methods. Investigations often begin by examining internet communication records, IP addresses, and log files that can provide clues about identities and activities. Specialized forensic software and techniques are used to document network traffic, installed programs, and volatile memory during intrusion investigations.