language-icon Old Web
English
Sign In

Data Capture and Exploitation

2015 
In this chapter, we will discuss data at rest and data in motion, how it can be stolen, and what is at risk. We will discuss other methods of data exploitation and theft as well as cover how digital forensics can be used to reconstruct a crime scene and provide evidence. Other topics will include how to mitigate this thread specifically with encryption and how we can safeguard our data and identities. We will discuss how to set up a data capture methodology for physical and logical spying on user activities. Other topics include data capture, dissemination, and use as well as legal concerns.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []