Seizing, imaging, and analyzing digital evidence : step-by-step guidelines

DAY, David (2014). Seizing, imaging, and analyzing digital evidence : step-by-step guidelines. In: AKHGAR, Babak, STANIFORTH, Andrew and BOSCO, Francesca M., (eds.) Cyber crime and cyber terrorism investigator's handbook. Waltham, MA., Syngress, 71-88.

[img] PDF
Seizing_iamging_and_analysing_digital_evidence.pdf
Restricted to Repository staff only
Available under License All rights reserved.

Download (207kB)
Link to published version:: 10.1016/B978-0-12-800743-3.00007-4

Abstract

Hiding and obfuscating their identities and digital evidence are now common activities for many malicious hackers. This coupled with anti-forensic and anonymising techniques, such as encryption and proxy relays, have made the aims of the digital investigator more difficult to achieve. It is simple to make errors which cause vital evidence to remain undetected, or worse having found it go on to contaminate it through poor practice. This chapter suggests best practices to help obtain exhibits and uncover obfuscated evidence while maintaining its integrity for submission in court.

Item Type: Book Section
Research Institute, Centre or Group: Cultural Communication and Computing Research Institute > Communication and Computing Research Centre
Identification Number: 10.1016/B978-0-12-800743-3.00007-4
Related URLs:
Depositing User: David Day
Date Deposited: 27 Feb 2015 10:14
Last Modified: 10 Nov 2016 00:43
URI: http://shura.shu.ac.uk/id/eprint/9459

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics