Book Image

Practical Digital Forensics

By : Richard Boddington
Book Image

Practical Digital Forensics

By: Richard Boddington

Overview of this book

Digital Forensics is a methodology which includes using various tools, techniques, and programming language. This book will get you started with digital forensics and then follow on to preparing investigation plan and preparing toolkit for investigation. In this book you will explore new and promising forensic processes and tools based on ‘disruptive technology’ that offer experienced and budding practitioners the means to regain control of their caseloads. During the course of the book, you will get to know about the technical side of digital forensics and various tools that are needed to perform digital forensics. This book will begin with giving a quick insight into the nature of digital evidence, where it is located and how it can be recovered and forensically examined to assist investigators. This book will take you through a series of chapters that look at the nature and circumstances of digital forensic examinations and explains the processes of evidence recovery and preservation from a range of digital devices, including mobile phones, and other media. This book has a range of case studies and simulations will allow you to apply the knowledge of the theory gained to real-life situations. By the end of this book you will have gained a sound insight into digital forensics and its key components.
Table of Contents (18 chapters)
Practical Digital Forensics
Credits
About the Author
Acknowledgment
About the Reviewer
www.PacktPub.com
Preface
Index

Case study – presumed unauthorized use of intellectual property


This recent case study exemplifies some of the problems that occur during examinations and provides some tips on avoiding certain pitfalls that occur.

The background to the case

This was an industrial espionage case involving a member of staff who was suspected of stealing the intellectual property of the employer. Suspicion arose when the CCTV footage of the office detected the employee's presence at his workstation during out-of-office hours for a 2-hour period—unusual activity for staff members. Scrutiny of the CCTV footage showed a partial view of what appeared to be the employee's laptop, on which could be observed the opening of files on the desktop.

Examination of the company's server confirmed the download of a number of files, including images, spreadsheets, and some text documents, at the same time as the CCTV footage. The server logs also showed synchronization between the server and the e-mail account on the laptop...