CHAPTER 13
Stealing Information
We’ll Cover
How to look for patterns and identify artifacts
How to determine where the data went
How to detect which data has been taken on external devices
The theft of information can involve a lot of diverse activities, but in this chapter, we will cover the most common example: the theft of corporate information by a (soon-to-be) ex-employee. We’ll look at how to determine where the stolen data has gone ...
Get Computer Forensics InfoSec Pro Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.