Certificate of Proficiency in Digital Evidence & eDiscovery Law Practice in Nigeria

Weekly training modules are based on the textbook: DIGITAL EVIDENCE & eDISCOVERY LAW PRACTICE IN NIGERIA by the Convener of the course Emeka Arinze Esq, LLM, M.I.T (info-tech), CBSP (Certified Biometric & Surveillance Professional, CDEA (Certified Digital Evidence Analyst), CCI (Certified Cybercrime Investigator), CFP (Certified Forensic Professional).

Learn More About Emeka Arinze

WEEK

13

5 hours to complete
Logs as Digital Evidence See Chapter 13 of the book for further reading

Logs, as digital evidence, are, to a digital forensic investigation, what fingerprints are to a conventional crime scene, or financial ledgers are to a financial audit. Logs are independent, machine-generated record of what happened within a network for both system and user activity. They are emitted by network devices, operating systems, applications and all manner of intelligent or programmable devices. Today, all forms of electronic documents and data are sought-after evidence in civil and criminal litigation. When set up properly, and with the appropriate due care, logs can provide an immutable fingerprint of system and user activity. In many cases, the logs tell a story of what really happened in an incident, what systems were involved, how the systems and people behaved, what information was accessed, who accessed it, and precisely when these activities took place.

Despite the best precautions, when the inevitable happens, your log data becomes critical for identifying the cause of the breach.

The Focus of this Weekly Module

This weekly module reviews the use of log record analysis in legal proceedings. The review raises the following questions: What are log records and how are they created? What are the types of logging devices? Can log records (like other electronic evidence) be manipulated? Are there any recent case examples? And how are logs authenticated for admissibility.

Gains and Benefit

On completion of the lecture as espoused in the video, reading activity, quiz and assessment, you will be able to understand:

  • what constitute Log Files/Records;
  • different log types and their evidentiary values;
  • how log records can be manipulated;
  • activities highlighting the Usefulness of Log Records in Litigation Process;
  • the authentication of Log data for admissibility
5 Videos (Total 30 min), 1 reading, 1 quiz, 1 assignment SEE ALL
5 videos
What constitute Log Files/Records;
Different Log Types and their evidentiary values;
How Log Records can be manipulated;
Activities highlighting the Usefulness of Log Records in Litigation Process;
The authentication of Log Data for admissibility.
1 readings
Module Guide
1 quiz
Activity - Answer a 30 min question & answer test
1 assignment
Assignment title goes here