Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Chain of Custody

Handbook of Research on Security Considerations in Cloud Computing
The data source containing all the information related to the evidence handling occurred during the investigation. The evidence handling addresses both the physical devices and the data contained therein.
Published in Chapter:
Hard Clues in Soft Environments: The Cloud's Influence on Digital Forensics
Andrea Atzeni (Politecnico di Torino, Italy), Paolo Smiraglia (Politecnico di Torino, Italy), and Andrea Siringo (Former Student at Politecnico di Torino, Italy)
Copyright: © 2015 |Pages: 27
DOI: 10.4018/978-1-4666-8387-7.ch012
Abstract
Cloud forensics is an open and important area of research due to the growing interest in cloud technology. The increasing frequency of digital investigations brings with it the need for studying specific scenarios in the area of forensics, both when evidence are inside the cloud and when the cloud can be used as platform to perform the investigations. In this chapter we highlight the problems digital forensics must deal with in the Cloud. We introduce historical roots of digital forensics, as well as an overall background about the Cloud and we provide possible meanings of cloud forensics, based on available definitions. Since the cloud introduces different architectural paradigm that affects all the phases of a forensics investigation, in this survey we detail many security issues digital forensics have to face in a cloud environment. We describe when and what available solutions exist and, on the contrary, the still open problems, and we discuss possible future directions in this field.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Response and Recovery Tactics
Method of ensuring that samples can be traced from collection, through shipping, to diagnostics and results. This ensures that the samples have legally been in possession or transit at all times.
Full Text Chapter Download: US $37.50 Add to Cart
Tactical Applications of Microbial Forensics in Agricultural and Environmental Biosecurity
An unbroken, clearly documented, chronological record of the custody, transfer, storage, and disposition of physical or electronic evidence.
Full Text Chapter Download: US $37.50 Add to Cart
To Monitor and Detect Suspicious Transactions in a Financial Transaction System Through Database Forensic Audit and Rule-Based Outlier Detection Model
Chain of custody is a series of events viewed in sequence. It is a process to keep accountability of chain of actions and evidences revealed during a crime investigation. It keeps the chronological documentation or paper trail that records the sequence of physical or digital evidence. Evidence needs to follow a chain of custody which is the standard processes for collecting, documenting, and protecting evidence.
Full Text Chapter Download: US $37.50 Add to Cart
Forensic Readiness for Enhanced eDiscovery
A chain of custody is a document that records all the processes digital evidence passed through from the point of collection through preservation to presentation as evidence in court or other proceedings. It details how the evidence was collected, analyzed, and stored are recorded, including who accessed it, when and why.
Full Text Chapter Download: US $37.50 Add to Cart
Forensic Readiness and eDiscovery
A chain of custody is a document that records all the processes digital evidence passed through from the point of collection to preservation as evidence in court or other proceedings. Details of how the evidence was collected, analyzed and stored are recorded, including who accessed it, when and why.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Evidence Collection and Preservation in Computer Network Forensics
Information that details every change in possession, access, and location of digital evidence is known as the chain of custody. It's essential for verifying the integrity of the evidence.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR