legal regulations 12
1. List the steps in maintaining chain of custody for digital evidence.
2. Why is it important to follow the chain of custody when gathering evidence?
3. For the computer forensics case, identify what evidence the forensics experts were able to gather.
4. Name two of the things the United States attorney was able to prove in the computer forensics case.
5. What important questions should the security incident response form answer?
6. Why is it important to include a time/date stamp in the security incident response form?