Home > Articles > Security > Network Security

  • Print
  • + Share This
This chapter is from the book

Chapter Exercises

  1. Look up at least one criminal case that involved data carving. Was the technique useful for the prosecution or for the defense?
  2. Think of as many ways as possible in which a civil case involving electronic discovery of specific e-mails would differ from a criminal cases in which a search of a suspect’s e-mail archives must be conducted. Don’t try to get too specific here, as this is simply an overview chapter.
  3. Throughout the investigation, a myriad of actions are performed. At what point does the chain of custody begin, and how is it relevant at each subsequent stage?
  • + Share This
  • 🔖 Save To Your Account