Seizing, imaging, and analyzing digital evidence : step-by-step guidelines

DAY, David (2014). Seizing, imaging, and analyzing digital evidence : step-by-step guidelines. In: AKHGAR, Babak, STANIFORTH, Andrew and BOSCO, Francesca M., (eds.) Cyber crime and cyber terrorism investigator's handbook. Waltham, MA., Syngress, 71-88.

[img] PDF
Seizing_iamging_and_analysing_digital_evidence.pdf
Restricted to Repository staff only
All rights reserved.

Download (207kB)
Link to published version:: https://doi.org/10.1016/B978-0-12-800743-3.00007-4
Related URLs:

Abstract

Hiding and obfuscating their identities and digital evidence are now common activities for many malicious hackers. This coupled with anti-forensic and anonymising techniques, such as encryption and proxy relays, have made the aims of the digital investigator more difficult to achieve. It is simple to make errors which cause vital evidence to remain undetected, or worse having found it go on to contaminate it through poor practice. This chapter suggests best practices to help obtain exhibits and uncover obfuscated evidence while maintaining its integrity for submission in court.

Item Type: Book Section
Research Institute, Centre or Group - Does NOT include content added after October 2018: Cultural Communication and Computing Research Institute > Communication and Computing Research Centre
Departments - Does NOT include content added after October 2018: Faculty of Science, Technology and Arts > Department of Computing
Identification Number: https://doi.org/10.1016/B978-0-12-800743-3.00007-4
Page Range: 71-88
Depositing User: David Day
Date Deposited: 27 Feb 2015 10:14
Last Modified: 18 Mar 2021 06:08
URI: https://shura.shu.ac.uk/id/eprint/9459

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics