Hashing is used in digital forensics to show that the ____ of the evidence has not been
compromised. - Answers integrity
Ensuring that evidence is what it claims to be and has probative value is known as ______ in
digital forensics. - Answers authentication
ISFCE, GIAC and IACIS are all sources or originators of digital forensics _____. - Answers
certifications
Something has _______ if it is used in a significant way in a crime. - Answers instrumentality
The application of science to law is called ______ science. - Answers forensic
The wiring of all the things, even mundane items like refrigerators, to the Internet is creating the
_______. - Answers IoT
Proof that there is continuity of possession of evidence is done with the _____. - Answers chain
of custody
_______ occurs when improperly obtained evidence is used as the basis for conducting a
legitimate case but only the legitimate method is revealed in court. - Answers parallel
construction
The first computer crime law anywhere was created in _____ because of false winning dog track
tickets. - Answers Florida
In the scientific method we either reject or ______ the hypothesis. - Answers fail to reject
Thinking of a computer used in a crime as being a(n) object, subject, tool or symbol is the basis
of ________ categories. - Answers Parker's
______ covers all property obtained by criminal acts. - Answers fruits of crime
Internet evidence that usually reflects a crime in the real world can be uncovered following the
______ of evidence. - Answers cybertrail
A(n) _______ characteristic uniquely identifies something. "That's my dog Summer", for example.
- Answers individual
Any data stored or transmitted using a computer that can be used to support or refute an
offense in law is _____ evidence. - Answers digital
Viewing computers in crime as hardware or software used as an instrumentality,
contraband/fruit of crime, or evidence follows the categories established by the _____. - Answers
USDOJ