CHAPTER 14
Internal Leaks
We’ll Cover
Why internal leaks happen
How to investigate internal leaks
Using file system meta-data to track leaked or printed materials
One of the most common and easiest ways organizational information is leaked is by someone working inside an organization. This chapter will prepare you to conduct a post-mortem investigation—that is, after an internal leak has occurred. I’ll cover how to investigate internal ...
Get Computer Forensics InfoSec Pro Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.