Explain the process used to preserve the verifiable integrity of digital evidence. How does this ensure that data is preserved unmodified? How can an analyst show that the original evidence is modified? What is a firewall? Identify and explain some of the functions of a firewall. What are its limitations?
Get a comprehensive answer to this question