Catalog Home Page

Digital evidence

Boddington, R. (2011) Digital evidence. In: Kerr, D., Gammack, J. and Bryant, K., (eds.) Digital Business Security Development: Management Technologies. IGI Global, Hershey, PA, pp. 37-72.

[img]
Preview
PDF - Published Version
Download (648kB) | Preview

    Abstract

    Digital evidence, now more commonly relied upon in legal cases, requires an understanding of the processes used in its identification, preservation, analysis and validation. Business managers relying on digital evidence in the corporate environment need a greater understanding of its true nature and difficulties affecting its usefulness in criminal, civil and disciplinary proceedings. This chapter describes digital evidence collection and analysis, and the implications of common challenges diminishing its admissibility. It looks at determining the evidentiary weight of digital evidence that can be perplexing and confusing because of the complexity of the technical domain. Digital evidence present on computer networks is easily replaced, altered, destroyed or concealed and requires special protection to preserve its evidentiary integrity. Consequently, business managers seeking the truth of a matter can find it a vexing experience, unless provided with a clear appraisal and interpretation of the relevant evidence. Validating evidence, that is often complex and incomplete, requires expert analysis to determine its value in legal cases to provide timely guidance to business managers and their legal advisers. While soundly configured security systems and procedures enhance data protection and recovery, they are often limited in the way they preserve digital evidence. Unprepared personnel can also contaminate evidence unless procedural guidelines and training are provided. The chapter looks at the benefits for prudent organisations, who may wish to include cyber forensic strategies as part of their security risk contingency, planning to minimise loss or degradation of digital evidence which, if overlooked, may have adverse legal repercussions.

    Publication Type: Book Chapter
    Murdoch Affiliation: School of Information Technology
    Publisher: IGI Global
    Copyright: © 2011 by IGI Global
    Publishers Website: http://www.igi-global.com/bookstore/Chapter.aspx?T...
    URI: http://researchrepository.murdoch.edu.au/id/eprint/3716
    Item Control Page

    Downloads

    Downloads per month over past year