Reference no: EM133761120
Discussion Post: Digital Forensics and Investing
Part I
During this module, you explored the topics of forensic methods and labs. Different kinds of cases go through different processes. It is important that the investigator manages digital evidence throughout this process and follows guidelines. Consider the do's and don'ts of managing digital evidence and respond to the following:
1) Explain how to manage digital evidence throughout the lifecycle of a case so that it is admissible in court or for use in legal action. List two reasons why digital evidence might be inadmissible.
2) Identify the requirements for acquiring and authenticating evidence.
3) Support your viewpoint using sources from the Internet, your textbook, or the Saudi Digital Library.
Part II
During this module, you explored techniques for hiding and scrambling information. Archived/temp data are a reliable source of e-evidence.
1) Identify two possible scenarios where steganography could be used to bypass law enforcement or corporate rules. Is there a legal reason for individuals to use this technique?
2) Explain how steganography could complicate a digital forensic investigation.
3) Support your viewpoint using sources from the Internet, your textbook, or the Saudi Digital Library.