Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

need help with comment about the discussion below: The integrity of evidence, especially digital evidence, is absolutely necessary when it comes to courts and how

need help with comment about the discussion below: The integrity of evidence, especially digital evidence, is absolutely necessary when it comes to courts and how to view what evidence can be used or not in court. If the evidence has been changed or modified at all then they potentially lost evidence that could prove that a certain suspect did in fact do the crime. The last thing anybody wants is law enforcement to mess up evidence and enable the criminal to walk back out on the streets only do commit the crime again.

There are a number of ways that law enforcement can preserve the integrity of the digital evidence. First and foremost, documentation of the scene and of all the evidence should be in order. Without initial and deeper documentation on what law enforcement finds could leave open holes. Another step would be to take an exact copy of the original evidence to work with so that there is not way that someone could mess up and accidently modify the original. After this, the team needs to establish a chain of custody on the way of preserving it in a secure vault therefore nothing could chance it. The chain of custody will have documentation for every handoff and verification that the evidence has not been altered during every handoff. This ensures the data is preserved and not modified because of the extent of the documentation and chain of custody that is in place. You will take a copy of the evidence as soon as you find it and then compare the original to the copy to ensure there is no changes. When analysts look and make sure the data is not altered, they will compare hash values between the original and acquired (Michael, 2023).

A firewall is a network device that that monitors traffic to and from your network. Functions of a firewall consist of blocking unauthorized access, traffic filtering, defense, and possibly compliance (What is a Firewall, n.d.). Firewalls could have all or none of these depending on what you would want. Insider threats are one of the biggest limitations on a firewall because they only look at traffic coming in and out of the network, not insider traffic running around on the internal network.

Chris

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Business Law Text And Cases

Authors: Kenneth W. Clarkson, Roger LeRoy Miller

15th Edition

0357129636, 978-0357129630

More Books

Students also viewed these Law questions

Question

Self-awareness is linked to the businesss results.

Answered: 1 week ago

Question

1. Too reflect on self-management

Answered: 1 week ago

Question

Food supply

Answered: 1 week ago