In this cyber security lecture, you will learn about the following:
– What is need for computer forensics
– What is chain of custody
– What is network forensics
– Difference between physical evidence and digital evidence
– Different contexts involved in identifying digital evidence
– Guidelines for collection of digital evidence

Share: