Chapter 7

Passwords and Encryption

  • Obtaining passwords
  • Encryption basics
  • Common encryption practices
  • Weaknesses of encryption
  • What to do when you find encrypted data

Computer forensics is all about perspective and process. A forensic investigator’s main perspective must be as a neutral party in all activities. Approach each investigation the same way, ensuring that it is repeatable and sound. After evidence is identified and preserved, analyze it to determine its impact on your case. In many situations, forensic investigators don’t have the authority to disclose any evidence except to authorized individuals. It all depends on who owns the computer and who is paying for the investigation. As a forensic investigator, you need to know how to ...

Get Computer Forensics JumpStart, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.