DAY, David (2014). Seizing, imaging, and analyzing digital evidence : step-by-step guidelines. In: AKHGAR, Babak, STANIFORTH, Andrew and BOSCO, Francesca M., (eds.) Cyber crime and cyber terrorism investigator's handbook. Waltham, MA., Syngress, 71-88.
PDF
Seizing_iamging_and_analysing_digital_evidence.pdf Restricted to Repository staff only All rights reserved. Download (207kB) |
Abstract
Hiding and obfuscating their identities and digital evidence are now common activities for many malicious hackers. This coupled with anti-forensic and anonymising techniques, such as encryption and proxy relays, have made the aims of the digital investigator more difficult to achieve. It is simple to make errors which cause vital evidence to remain undetected, or worse having found it go on to contaminate it through poor practice. This chapter suggests best practices to help obtain exhibits and uncover obfuscated evidence while maintaining its integrity for submission in court.
Item Type: | Book Section |
---|---|
Research Institute, Centre or Group - Does NOT include content added after October 2018: | Cultural Communication and Computing Research Institute > Communication and Computing Research Centre |
Departments - Does NOT include content added after October 2018: | Faculty of Science, Technology and Arts > Department of Computing |
Identification Number: | https://doi.org/10.1016/B978-0-12-800743-3.00007-4 |
Page Range: | 71-88 |
Depositing User: | David Day |
Date Deposited: | 27 Feb 2015 10:14 |
Last Modified: | 18 Mar 2021 06:08 |
URI: | https://shura.shu.ac.uk/id/eprint/9459 |
Actions (login required)
View Item |
Downloads
Downloads per month over past year