When preparing evidence that may be used in legal proceedings, cybersecurity experts must understand the type of evidence collected and how it may be used. In this video, learn about the different types of evidence used in legal proceedings.
- [Instructor] When preparing evidence…that may be used in legal proceedings,…cyber security experts must understand…the type of evidence collected,…and how it may be used.…There are three main types of evidence.…Real evidence, documentary evidence,…and testimonial evidence.…Real evidence consists of tangible objects…that may be brought into a courtroom…and examined by all the parties involved.…When a television attorney waves a bloody knife…in front of the jury,…the attorney is displaying real evidence…for the jury's consideration.…
In the case of digital crimes,…real evidence may consist of actual computer equipment.…Documentary evidence includes information…brought into court in written or digital form.…Documentary evidence may be used…to help demonstrate facts to the court.…Documentary evidence may include traditional documents,…such as a contract that's under dispute,…or it may include digital evidence…such as computer logs.…There are some legal rules that apply…to the use of documentary evidence.…
First, documentary evidence must be authenticated…
Author
Updated
10/27/2020Released
11/27/2018- Creating an incident response team
- Classifying incidents
- Building an incident response program
- Identifying symptoms of incidents
- Conducting forensic investigations
- Logging and monitoring
Skill Level Intermediate
Duration
Views
Related Courses
-
Insights from a Cybersecurity Professional
with Mike Chapple32m 15s Intermediate -
CISM Cert Prep: 1 Information Security Governance
with Mike Chapple1h 50m Intermediate
-
Introduction
-
Study resources1m 24s
-
1. Incident Response
-
2. Assessing Incidents
-
Threat classification4m 5s
-
3. Incident Response Process
-
Incident communications plan2m 51s
-
Incident identification4m 2s
-
Escalation and notification2m 42s
-
Mitigation2m 46s
-
Containment techniques3m 21s
-
Validation2m 20s
-
4. Incident Symptoms
-
Network symptoms4m 2s
-
Endpoint symptoms2m 55s
-
Application symptoms2m 20s
-
-
5. Forensic Investigations
-
Evidence types3m 51s
-
System and file forensics4m 17s
-
Creating forensic images5m 36s
-
Digital forensics toolkit2m 44s
-
Password forensics8m 9s
-
Network forensics4m 19s
-
Software forensics2m 52s
-
Mobile device forensics1m 14s
-
Embedded device forensics2m 50s
-
Chain of custody2m 13s
-
6. Logging and Monitoring
-
Data loss prevention6m 34s
-
Conclusion
-
Next steps1m 16s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Evidence types