When preparing evidence that may be used in legal proceedings, cybersecurity experts must understand the type of evidence collected and how it may be used. In this video, learn about the different types of evidence used in legal proceedings.
- [Narrator] When preparing evidence…that may be used in legal proceedings,…cyber security experts must understand…the type of evidence collected and how it may be used.…There are three main types of evidence.…Real evidence, documentary evidence,…and testimonial evidence.…Real evidence consists of tangible objects…that may be brought into a court room…and examined by all the parties involved.…When a television attorney waves…a bloody knife in front of the jury,…the attorney is displaying real evidence…for the jury's consideration.…
In the case of digital crimes,…real evidence may consist of actual computer equipment.…Documentary evidence includes information…brought into court in written or digital form.…Documentary evidence may be used…to help demonstrate facts to the court.…Documentary evidence may include traditional documents…such as a contract that's under dispute.…Or it may include digital evidence such as computer logs.…There are some legal rules that apply…to the use of documentary evidence.…
First, documentary evidence must be authenticated…
Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
Note: This course is part of a series releasing throughout 2018. A complete learning path will be available once all the courses are released.
- Conducting investigations
- Reporting and documenting incidents
- Continuous security monitoring
- Preventing data loss and theft
- Asset management
- Change management
- Virtualization security
- Security principles: need to know, separation of duties, and more
- Building an incident response program
- Personnel safety and emergency management
Skill Level Intermediate
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Intermediate
1. Investigations and Forensics
2. Logging and Monitoring
Data loss prevention6m 34s
3. Resource Security
4. Security Principles
5. Incident Management
6. Personnel Safety
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.