When there is a security breach, you need to identify the source. Digital forensics methods recover and investigate material found in digital devices, often in relation to crime. Initially, we gather evidence from CD/DVDs, hard drives, flash drives, memory sticks, and magnetic tapes, etc. Then we methodically work through scientifically proven methods for the collection, validation, identification, analysis, interpretation, preservation, documentation and presentation of digital evidence. Knowing the source will allow you to ascertain the best way to respond as well as remove the presence of the threat from your environment.