Please enable JavaScript.
Coggle requires JavaScript to display documents.
17:5 (IS auditor should consider key elements of computer forensics during…
17:5
-
1 COMPUTER FORENSICS
“process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable in any legal proceedings :raised_hand_with_fingers_splayed::skin-tone-3: :envelope_with_arrow: :mag:
-
includes activities that involve the exploration and application of methods to gather, process, interpret and use digital evidence that help to substantiate whether an incident happened, such as:
-
-
Any electronic document or data can be used as digital evidence,
provided there is sufficient manual or electronic proof that the contents of digital evidence are in their original state
and have not been tampered with or modified during the process of collection and analysis.
For evidence to be admissible in a court of law, the chain of custody needs to be maintained professionally.
-
-
Chain of custody refers to documenting, in detail, how evidence is handled and maintained, including its ownership, transfer and modification.
-
-
-