O'Reilly logo

Cyber Reconnaissance, Surveillance and Defense by Robert Shimonski

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Data Capture and Exploitation

Abstract

In this chapter, we will discuss data at rest and data in motion, how it can be stolen, and what is at risk. We will discuss other methods of data exploitation and theft as well as cover how digital forensics can be used to reconstruct a crime scene and provide evidence. Other topics will include how to mitigate this thread specifically with encryption and how we can safeguard our data and identities. We will discuss how to set up a data capture methodology for physical and logical spying on user activities. Other topics include data capture, dissemination, and use as well as legal concerns.

Keywords

Data Capture
Exploitation
Data Theft
Digital Forensics
Data at Rest
Data in Motion
Mitigation ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required