The digital evidence is used to establish the credible link between … a. System, evidence and victim
b. Attacker, victim, and crime scene
c. Attacker, victim and case file
d. Attacker, system and victim
b. Attacker, victim, and crime scene
c. Attacker, victim and case file
d. Attacker, system and victim