Description
Hi everyone!Preserving the verifiable integrity of digital evidence is very important in forensic investigations to ensure that data remains un tampered with throughout the investigation process. In order to achieve this, there are a few practices investigators need to comply with:Maintain proper Documentation and Chain of Custody.Encrypting Data and implementing Digital signatures on evidence.Using proper Forensic Tools for data collection.If any one of these practices is not followed thoroughly, an analyst should be able to detect whether or not the original evidence was modified. If the proper tools are in place, anyone should be able to look through log records to see what was changed. According to Check point security, “a Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization’s previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet. A firewall’s main purpose is to allow non-threatening traffic in and to keep dangerous traffic out.” (Checkpoint, 2023) Some limitations a firewall has is that it doesn’t necessarily prevent your users from accessing the data or information from malicious websites.Bferrite. (2023, September 7). What is a Firewall? the different types of firewalls. Check Point Software. https://www.checkpoint.com/cyber-hub/network-security/what-is-firewall/#:~:text=A%20Firewall%20is%20a%20network,network%20and%20the%20public%20Internet.