CHAPTER 14
Internal Leaks
We’ll Cover
 
image   Why internal leaks happen
image   How to investigate internal leaks
image   Using file system meta-data to track leaked or printed materials
 
One of the most common and easiest ways organizational information is leaked is by someone working inside an organization. This chapter will prepare you to conduct a post-mortem investigation—that is, after an internal leak has occurred. I’ll cover how to investigate internal ...

Get Computer Forensics InfoSec Pro Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.