Chapter 7

Data Capture and Exploitation


In this chapter, we will discuss data at rest and data in motion, how it can be stolen, and what is at risk. We will discuss other methods of data exploitation and theft as well as cover how digital forensics can be used to reconstruct a crime scene and provide evidence. Other topics will include how to mitigate this thread specifically with encryption and how we can safeguard our data and identities. We will discuss how to set up a data capture methodology for physical and logical spying on user activities. Other topics include data capture, dissemination, and use as well as legal concerns.


Data Capture
Data Theft
Digital Forensics
Data at Rest
Data in Motion
Mitigation ...

Get Cyber Reconnaissance, Surveillance and Defense now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.