extend the acquisition and interpretation, including implications, of cyber investigations beyond traditional workstation and server approaches. Specifically, include mobile devices, IoT, virtual machines, and cloud computing. Do not focus on traditional devices. Establish specific considerations for forensic and incident investigations related to the cyber domain. Consider challenges and the need for updated capabilities.