In Part 2 of this series, we discuss definitions for intellectual property; concepts for authentication of suspect data; introduction to hashing algorithms; electronic discovery protocols; definitions and standards for digital evidence acquisition, capture, and authentication; cyberstalking and online social networks; data protection and privacy regulations; federal powers and the Interstate Commerce Clause; introduction to federal rules governing computer crime and intellectual property theft; FOIA and Sunshine Laws; the process of building a computer crime case; identification of suspect evidence, including form factors and formats used for storage containers; building a forensics toolkit; write blocking devices and the ideal disk imaging system; introduction to Host Protected Area (HPA) analysis; introduction to BIOS and firmware-based rootkits and trojan technology; and more.
Errata: In this episode we made a mistake by saying that the HPA is at the beginning of the drive; the DCO and HPA both exist at the end of the drive. Thanks to Rush for pointing this out.
This LiveAmmo Podcast is in .mp3 format, 00:46:49 in duration, and a 22.47 MB download.
Visit the LiveAmmo Computer Forensics Podcast Archives for more information about how to subscribe to our podcasts and news feeds.
No comments:
Post a Comment