CHAPTER 13
Stealing Information
We’ll Cover
 
image   How to look for patterns and identify artifacts
image   How to determine where the data went
image   How to detect which data has been taken on external devices
 
The theft of information can involve a lot of diverse activities, but in this chapter, we will cover the most common example: the theft of corporate information by a (soon-to-be) ex-employee. We’ll look at how to determine where the stolen data has gone ...

Get Computer Forensics InfoSec Pro Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.