Chapter 6

Antiforensics

Information in This Chapter:

ent Introduction of Encryption Technology and the Threat It Poses

ent Attacks Used to Break Encryption

ent Techniques Used to Hide and Destroy Data

Digital forensic success stories are becoming widely known. As such, there is also a keen interest in obstructing these types of investigations. Some of these techniques are so effective, they can make recovering the information virtually impossible. This is ...

Get The Basics of Digital Forensics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.