Translations:Digitization, Preservation and Ingest/248/en: Difference between revisions

From Wiki
(Importing a new version from external source)
 
(Importing a new version from external source)
 
Line 1: Line 1:
{| class="wikitable"
{| class="wikitable"
|
|+
!Digital Forensics
|-
|If working with older data storage formats  or digital material of unclear origin and features—especially when a history  of the material and “chain of custody” need to be established—a promising area  of development is '''[[Special:MyLanguage/Glossary of Key Terms and Concepts#Digital Forensics|digital forensics]]''',”  which provide benefits in addressing digital  authenticity, accountability, and accessibility. This forensic technology can  make it possible to identify privacy issues, establish a chain of custody for  provenance, employ write protection for capture and transfer, and detect  forgery or manipulation. It can also extract and mine relevant metadata and  content, enable efficient indexing and searching by curators, and facilitate  audit control and granular access privileges. Digital forensic technologies  vary greatly in their capability, cost, and complexity, with certain  equipment ranging from free to expensive. Some techniques are very  straightforward to use, while others have to be applied with great care and  sophistication. There is an increasingly rich set of open source forensic  tools (e.g., “BitCurator”) that are free to obtain and use.
|}

Latest revision as of 16:47, 17 March 2024

Information about message (contribute)
This message has no documentation. If you know where or how this message is used, you can help other translators by adding documentation to this message.
Message definition (Digitization, Preservation and Ingest)
{| class="wikitable"
|+
!Digital Forensics
|-
|If working with older data storage formats  or digital material of unclear origin and features—especially when a history  of the material and “chain of custody” need to be established—a promising area  of development is '''[[Special:MyLanguage/Glossary of Key Terms and Concepts#Digital Forensics|digital forensics]]''',”  which provide benefits in addressing digital  authenticity, accountability, and accessibility. This forensic technology can  make it possible to identify privacy issues, establish a chain of custody for  provenance, employ write protection for capture and transfer, and detect  forgery or manipulation. It can also extract and mine relevant metadata and  content, enable efficient indexing and searching by curators, and facilitate  audit control and granular access privileges. Digital forensic technologies  vary greatly in their capability, cost, and complexity, with certain  equipment ranging from free to expensive. Some techniques are very  straightforward to use, while others have to be applied with great care and  sophistication. There is an increasingly rich set of open source forensic  tools (e.g., “BitCurator”) that are free to obtain and use.
|}
Digital Forensics
If working with older data storage formats or digital material of unclear origin and features—especially when a history of the material and “chain of custody” need to be established—a promising area of development is digital forensics,” which provide benefits in addressing digital authenticity, accountability, and accessibility. This forensic technology can make it possible to identify privacy issues, establish a chain of custody for provenance, employ write protection for capture and transfer, and detect forgery or manipulation. It can also extract and mine relevant metadata and content, enable efficient indexing and searching by curators, and facilitate audit control and granular access privileges. Digital forensic technologies vary greatly in their capability, cost, and complexity, with certain equipment ranging from free to expensive. Some techniques are very straightforward to use, while others have to be applied with great care and sophistication. There is an increasingly rich set of open source forensic tools (e.g., “BitCurator”) that are free to obtain and use.