Seizing, imaging, and analyzing digital evidence : step-by-step guidelines

DAY, David (2014). Seizing, imaging, and analyzing digital evidence : step-by-step guidelines. In: AKHGAR, Babak, STANIFORTH, Andrew and BOSCO, Francesca M., (eds.) Cyber crime and cyber terrorism investigator's handbook. Waltham, MA., Syngress, 71-88.

[img] PDF
Restricted to Repository staff only
All rights reserved.

Download (207kB)
Link to published version::


Hiding and obfuscating their identities and digital evidence are now common activities for many malicious hackers. This coupled with anti-forensic and anonymising techniques, such as encryption and proxy relays, have made the aims of the digital investigator more difficult to achieve. It is simple to make errors which cause vital evidence to remain undetected, or worse having found it go on to contaminate it through poor practice. This chapter suggests best practices to help obtain exhibits and uncover obfuscated evidence while maintaining its integrity for submission in court.

Item Type: Book Section
Research Institute, Centre or Group: Cultural Communication and Computing Research Institute > Communication and Computing Research Centre
Departments: Faculty of Science, Technology and Arts > Department of Computing
Identification Number:
Related URLs:
Depositing User: David Day
Date Deposited: 27 Feb 2015 10:14
Last Modified: 28 Mar 2019 15:30

Actions (login required)

View Item View Item


Downloads per month over past year

View more statistics