Chain of Custody
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
1 hour 49 minutes
We previewed it in other modules and other lessons,
and now we're getting to it. We're going to talk about in module and less than 2.4,
the chain of custody in the concept of chain of custody.
In this video, we're going to talk about what is chain of custody and why is it so important?
The National Institute of Standards and Technology defines chain of custody as a process that tracks the movement of evidence through its collection, safeguarding and analysis lifecycle by documenting each person who handles the evidence, the date and time it was collected or transferred. And the purpose for any transfers.
Chain of custody is so vital
because without a proper documentation off, who had the evidence why they had the evidence what they did with the evidence
when they did that with the evidence, it's impossible to separate
the analysis team and the experts
and the normal operation of the evidence.
It's also very hard to
argue that some piece of evidence wasn't manipulated
if there's no tracking, no way to identify what occurred,
how the safeguarding occurred,
what was done during the analysis process,
what's known as the chain of custody being broken will occur
and the admissibility of the evidence, the reliability of the findings
will also be called into question.
vital, very important, that
chain of custody be properly maintained
because this is the start of that process. This is the start of documentation, and this is where
the most important piece
of documentation will occur because a simple break in the chain of custody will affect the admissibility of the evidence.
In this video we discussed, What is the chain of custody
and why is it so important?