课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Chain of custody

Chain of custody

- [Instructor] When evidence is used in court or another formal setting, both parties involved in a dispute have the right to ensure that the evidence presented has not been tampered with during the collection, analysis, or storage process. We've already discussed how hashing can be used to verify that digital evidence hasn't changed. The chain of custody also plays an important role in ensuring the authenticity of evidence. The chain of custody, also known as the chain of evidence, provides a paper trail that tracks each time someone handles a piece of physical evidence. In the case of digital forensics, this might include the original hard drive, or other primary evidence collected by investigators and used in later analysis. When collecting physical evidence, it should always be placed in an evidence storage bag that is labeled with the date, time, and location of collection, the name of the person collecting the evidence, and the contents of the bag. It should then be sealed with…

内容