1. Discuss the validation requirements for the technology used in digital forensics.
2. List the ways suspects use the Internet in computer related crimes discussed in the lecture notes.
3. Discuss the reporting requirements for forensic investigators described in the lecture notes.
4. What makes digital forensics a science?
Attachment:- Chapter -12.rar