Content deleted Content added
database system |
No edit summary |
||
Line 5:
''[[Unstructured data]]'' in contrast is taken from communication and office applications or from mobile devices. This data has no overarching structure and analysis thereof means applying keywords or mapping communication patterns. Analysis of unstructured data is usually referred to as [[Computer forensics]].
==
The analysis of large volumes of data is typically performed in a separate [[database]] system run by the analysis team. Live systems are usually not dimensioned to run extensive individual analysis without affecting the regular users. On the other hand, it is methodically preferable to analyze data copies on separate systems and protect the analysis teams against the accusation of altering original data.
Line 18:
[[Data visualization|Data Visualization]] is often used to display the results.
==
* Jörg Meyer: ''Forensische Datenanalyse.'' 1. Edition. Erich Schmidt Verlag, Berlin 2012, {{ISBN|978-3-50313-847-0}}.
* Christian Hlavica, Uwe Klapproth, Frank Hülsberg et al: ''Tax Fraud & Forensic Accounting.'' Gabler Verlag, Wiesbaden 2011, {{ISBN|978-3-83491-429-3}}.
==External links==
*[https://cncintel.com/ Cyber Intelligence]
[[Category:Digital forensics]]
|