About
University of Pretoria
2024
The validity and integrity of digital evidence the chain custody are crucial to all forensic investigations. All new access logs original should be logged in a document called ‘chain custody’. This shows timeline any piece from time it was recorded until end investigation. In traditional investigation, trusted parties, such as an investigator, allowed follow strict process when dealing with data. These parties have capability alter data making inadmissible court law. Alternatively, these may...
10.34190/iccws.19.1.2025
article
EN
cc-by-nc-nd
International Conference on Cyber Warfare and Security
2024-03-21
Coming Soon ...