Computer Forensics in Investigations and in Court
|
|
|
- Randell Park
- 9 years ago
- Views:
Transcription
1 Computer Forensics in Investigations and in Court Presented to: The Center for Cybercrime Studies and The Center for Modern Forensic Practice, John Jay College of Criminal Justice (CUNY) by Edward M. Stroz, Co-President, Stroz Friedberg November 11, 2009
2 WHAT WE DO Consulting and Technical Services Specializing In: RESPONSE TO DIGITAL ELECTRONIC DATA BREACH ONLINE FRAUD FORENSICS DISCOVERY RESPONSE AND ABUSE INVESTIGATIONS
3 OUR CLIENTS 8 of the Fortune 10 Companies 72 of the Top 100 US Law Firms (AmLaw 100) 16 of the Top 20 UK Law Firms LEADING U.S. WORK MARTHA STEWART SECURITIES FRAUD CASE FTC BOGUS ANTI-SPYWARE CASES ENRON BARGE TRIAL AMD v. INTEL ATTY GEN L TASK FORCE TJX DATA BREACH MADOFF MONITOR
4 INDUSTRY LEADERSHIP Sedona Conference, Working Group1: Electronic Discovery New York State Bar Association: Electronic Discovery Committee Minnesota Bar Association: Computer Law Section American Bar Association Cybercrime Law Committee Digital Forensics and Cybercrime Textbook Writers Widely Published in Digital Forensics, E-Discovery, and Cybercrime journals Speaking Engagements: Sedona, ABA, IQPC, PLI, ISC2, IAPP, FTC, et al.
5 DIGITAL FORENSICS - CASES Theft of trade secrets Other job disputes (threats, discrimination) Data breaches Fraud investigations (SEC, FCPA) Patent infringement Trademark infringement E-discovery (spoliation claims, preservation)
6 Forensic Targets Workplace Computers Home Computers Storage Devices (DVDs, CDs, flash drives) Blackberries, PDA s, Cell Phones Digital Cameras Printers and Digital Faxes Servers (FTP, Web, , File) Web pages
7 Other Digital Sources Video surveillance Key cards Key loggers Packet Sniffers
8 FORENSICS IN E-DISCOVERY Digital Forensics PRESERVATION PROCESSING Expert Forensic Testimony INFORMATION MANAGEMENT IDENTIFICATION REVIEW PRODUCTION PRESENTATION COLLECTION ANALYSIS VOLUME RELEVANCE Consulting, Strategic Planning and Comprehensive Project Management
9
10
11 AVAILABLE EVIDENCE Hard Drives Deletion Activity ( deleted or partial files, wiping activity) Internet and Search History (surfing and webmail activity) System Activity (logins, files printed, devices inserted) Metadata ( modified created accessed dates, authors ) Removable Devices (thumb drives, DVD s) Link Files (access to files on and off the hard drive) Matching Files (exact copies and near-duplicates) CDs and DVDs Burn programs and dates
12 Cell Phones Contacts and last numbers dialed Saved files/photos , text messages Web Sites Offline, surfable copies of web site Source code Dynamic surfing or packet activity Psycho-linguistic patterns
13 DELETION ACTIVITY
14 INTERNET HISTORY Find webmail accounts such as Gmail or Hotmail Locate suspicious or inappropriate Internet activity (i.e. visiting competitors websites, pornography, etc.)
15 REMOVABLE DEVICES Traces of past devices can be uncovered with forensic analysis. The make and model of a thumb drive can often be found. The date and time when a device was first connected and last connected can be determined. Mass copying can often be determined by correlating the device connection with numerous files bearing the same last access times.
16 LINK FILES Provide data on files now missing or outside the hard drive. Proprietary tool created by Stroz Friedberg allows us to quickly and efficiently view the contents of link files Link file shows this document was accessed On a particular date and time And where the file was located.
17 FONT color=#fffff3 changes font color to white (on white) FONT color=#9999cc changes font color back to light blue
18 FORENSICS IN E-DISCOVERY - Auto-Coding Extracts text from the face of the document and organizes the information Beeman Judy, [email protected]
19 May 14, 2009 Dear To: Sent: 05/14/2009 8:32am From: Subject: Hi original message Sincerely, Mapping data location within a particular document type shows real author.
20 WORKS ON PAPER PHASE I PHASE II PHASE III Enhanced OCR Intelligence Extract Results
21 FORENSICS IN E-DISCOVERY Near Duplicate Identification Clustering Options: A Attachment Set E Exact Duplicates N Near Duplicates
22 FORENSICS IN E-DISCOVERY Near Duplicate Comparison Side by Side Comparison Highlights Differences
23 PSYCHO-LINGUISTIC PROFILING
24 PSYCHO-LINGUISTIC PROFILING (Asked to train his back-up, subject refuses) His experience was ZERO. He does not know ANYTHING about...our reporting tools. Until you fire me or I quit, I have to take orders from you Until he is a trained expert, I won t give him access...if you order me to give him root access, then you have to permanently relieve me of my duties on that machine. I can t be a garbage cleaner if someone screws up.i won t compromise on that. Content Analysis Cues Negatives/anger Me/victimization Key word/risk behavior
25 The Digital Thugs Ex-CIA profiler estimated that suspect was extremely angry and technologically sophisticated, had a history of work problems, and possibly owned weapons. Suspect sent multi-million million extortion demand and threatened to unleash a DOS attack using MicroPatent s name Suspect revealed he had been dumpster diving, prompting physical surveillance. Suspect was arrested at local college and his residence was searched...
26 When the defendant s d house in Maryland was searched, the FBI found numerous firearms, explosives and chemicals, as well as a recipe for the production of a deadly toxin.
27 Summary - When Forensics Make Cents Need Verified Preservation? Of key employee data By trusted third party Using scientific process Authenticity at Issue? Timing (hour/minute/sec) Authorship Data integrity Latent Data Needed? Full Metadata Historic/deleted data System logs Source code
28 Questions and Discussion Edward M. Stroz Co-President Stroz Friedberg, New York
Case Study: Hiring a licensed Security Provider
Case Study: Hiring a licensed Security Provider Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer forensics
What You Should Know About ediscovery
KPMG FORENSIC What You Should Know About ediscovery By Pamela Quintero February 18, 2009 What Guidelines Are Available? The Sedona Canada Principles Working Group 7 (WG7) The purpose and intent of the
Journal of Digital Forensic Practice
Journal of Digital Forensic Practice Journal of Digital Forensic Practice, 2:57 61, 2008 Copyright Taylor & Francis Group, LLC ISSN: 1556-7281 print / 1556-7346 online DOI: 10.1080/15567280801958464 UDFP
Best Practices Page 1
BEST PRACTICES FOR ELECTRONIC DISCOVERY IN CRIMINAL CASES Western District of Washington Adopted March 21, 2013 These best practices reflect recommendations adopted in February 2012 by the Department of
Information Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Digital Forensics & e-discovery Services
Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013
LEGAL TECHNOLOGIES AND COMPUTER FORENSICS DECEMBER 2013 Copyright Control Risks. All rights reserved. This document cannot be reproduced without the express written permission of Control Risks. Any reproduction
Admissibility of Digital Photographs in Criminal Trials
Admissibility of Digital Photographs in Criminal Trials Keith Hodges, Senior Instructor, [email protected] Federal Law Enforcement Training Center Glynco, GA 1 What we will discuss Digital photos captured
DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP
DISCOVERY OF ELECTRONICALLY-STORED INFORMATION IN STATE COURT: WHAT TO DO WHEN YOUR COURT S RULES DON T HELP Presented by Frank H. Gassler, Esq. Written by Jeffrey M. James, Esq. Over the last few years,
Acceptable Use Policy ("AUP")
Acceptable Use Policy ("AUP") Pacificnet Hosting (PacHosting)'s Acceptable Use Policy ("AUP") is provided to give our customers and users a clear understanding of what PacHosting expects of them while
Case Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
Case Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
Anthony Serero. Fbi computer forensics training Anthony Serero
Fbi computer forensics training Anthony Serero A Forensic Network is a series of processing and imaging computers connected and integrated directly with a high-speed, high-capacity server to share resources.
How To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
KPMG Forensic Technology Services
KPMG Forensic Technology Services Managing Costs in e-discoverye October 14, 2010 1 Agenda: Strategies to Manage Costs in e-discovery Pre-collection Strategies Filtering Strategies Review and Production
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
Apple ios 8 Security
Apple ios 8 Security Apple ios 8 Security Apple ios 8 Security What s this all about? For all devices running ios 8.0 and later versions, Apple will no longer be performing ios data extractions as the
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
Computer Forensics Preparation
Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics
Data Breach Strikes - Nerds & Geeks Unite: Effective Cooperation Between Privacy and Technical Experts Presented by: Paul H. Luehr, Managing Dir.
Data Breach Strikes - Nerds & Geeks Unite: Effective Cooperation Between Privacy and Technical Experts Presented by: Paul H. Luehr, Managing Dir. Stroz Friedberg Gerard M. Stegmaier, Esq. Wilson Sonsini
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Terms and Conditions. Acceptable Use Policy Introduction. Compliance with UK Law. Compliance with foreign law
Terms and Conditions Acceptable Use Policy Introduction (hereafter called Hosted Developments) has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources, and the resources
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 3: COMPUTER FORENSICS For thirty years, a serial murderer known as the BTK killer (standing for bind, torture, and kill) remained at large in Wichita,
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
Physical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
Computer Forensic Capabilities
Computer Forensic Capabilities Agenda What is computer forensics? Where to find computer evidence Forensic imaging Forensic analysis What is Computer Forensics? The preservation, identification, extraction,
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Build Context into Your Digital Forensic Exam With Online Evidence
Build Context into Your Digital Forensic Exam With Online Evidence Written by Vere Software 1 P a g e Contents Contents...2 Build Context into Your Digital Forensic Exam with Online Evidence...3 Investigation
ITU Session Two: Conduct a forensically safe investigation Mounir Kamal [email protected] Q-CERT
ITU Session Two: Conduct a forensically safe investigation Mounir Kamal [email protected] Q-CERT 2 The Importance of Crime Scene One of the main goals in an investigation is to attribute the crime to its
Chapter 15. Conducting Investigations and Report Writing
Chapter 15 Conducting Investigations and Report Writing 1 Learning Objectives Understand the circumstances that may necessitate an internal investigation. Identify who should be part of a fraud examination
CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e [email protected] w www.vincents.com.
CAPABILITY STATEMENT > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e [email protected] w www.vincents.com.au CAPABILITY FORENSIC TECHNOLOGY INDEX Page No. Introduction... 3
E-Discovery Technology Considerations
E-Discovery Technology Considerations Presented by: Dave Howard Oregon Department of Justice Deputy CIO Topics E-Discovery Process Overview Sources of Electronically Stored Information (ESI) Data Maps
Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data
Nuix And EDRM Case Study: Removing PII from Nuix the and EDRM EDRM Enron Case Data Study Set Removing PII from the EDRM Enron Data Set Investigating the prevalence of unsecured financial, health and personally
Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.
Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert [email protected] Why should we care about CYBER CRIME & CYBER SECURITY? Clarification
BACKUP THOSE IRREPLACEABLE FILES TO ANOTHER MEDIUM FOR SAFE KEEPING
BACKUP THOSE IRREPLACEABLE FILES TO ANOTHER MEDIUM FOR SAFE KEEPING A Seminar Presented by Bill Wilkinson November 2008 Backup: To copy data files to a second drive as a precaution in case the first drive
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
E-Discovery: New to California 1
E-Discovery: New to California 1 Patrick O Donnell and Martin Dean 2 Introduction The New Electronic Discovery Act The new Electronic Discovery Act, Assembly Bill 5 (Evans), has modernized California law
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
COB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
Scene of the Cybercrime Second Edition. Michael Cross
Scene of the Cybercrime Second Edition Michael Cross Chapter 1 Facing the Cybercrime Problem Head-On 1 Introduction 2 Defining Cybercrime 2 Understanding the Importance of Jurisdictional Issues 3 Quantifying
Bring Your Own Device Security and Privacy Legal Risks
Bring Your Own Device Security and Privacy Legal Risks Introduction Information Law Group, LLP National boutique firm with focus on information law Experienced, nationally-recognized privacy, technology,
FRAUD ALERT THESE SCAMS CAN COST YOU MONEY
FRAUD ALERT THESE SCAMS CAN COST YOU MONEY Phishing spear phishing vishing smishing debit card skimming fake check scams THE COMMON SENSE PRECAUTIONS INSIDE CAN KEEP YOU SAFE! SCHEMES SCAMS FRAUDS Criminals
Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners
Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners INTRODUCTION Virtually all modern discovery involves electronically stored information (ESI). The production and
Metadata, Electronic File Management and File Destruction
Metadata, Electronic File Management and File Destruction By David Outerbridge, Torys LLP A. Metadata What is Metadata? Metadata is usually defined as data about data. It is a level of extra information
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private
INTRODUCTION DEVELOPMENT AND PHENOMENA
INTRODUCTION DEVELOPMENT AND PHENOMENA ITU, ICB4PAC 02.03.2011, Vanuatu Prof. Dr. Marco Gercke, Director Cybercrime Research Institute Cybercrime Page: 1 GENERAL INTRODUCTION Cybercrime Seite: 2 CYBERCRIME
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation
Prevent Security Breaches by Protecting Information Proactively
Prevent Security Breaches by Protecting Information Proactively John Reichard, Senior Systems Engineer New York, NY November 17 th, 2011 1 Agenda 1 Causes of a Data Breaches 2 Breaches are Preventable
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
Case 9:14-cr-80031-KAM Document 135 Entered on FLSD Docket 07/27/2015 Page 1 of 2 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA
Case 9:14-cr-80031-KAM Document 135 Entered on FLSD Docket 07/27/2015 Page 1 of 2 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA UNITED STATES OF AMERICA CASE NO. 14-80031-CR-MARRA(s)(s) vs.
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY
LETABA WIRELESS INTERNET CC ACCEPTABLE USE POLICY 1. Introduction LETABA WIRELESS INTERNET CC is committed to complying with legislation and ensuring that all its customers have the ability to use its
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
Guide to advanced ediscovery solutions
RCLS Services & Technology Guide to advanced ediscovery solutions Océ Business Services Records, Compliance and Legal Solutions Products and Services Océ Business Services has earned the reputation as
Corona Police Department
By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,
LINCOLN UNIVERSITY. Approved by President and Active. 1. Purpose of Policy
LINCOLN UNIVERSITY Policy: Computer and Network Usage by Employees Policy Number: HRM-110 Effective Date: July 1, 2009 Revisions: Replaces, as they relate specifically to employees, IT Policies 517 Internet
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents
WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery
How to Avoid The Biggest Electronic Evidence Mistakes. Ken Jones Senior Technology Architect Pileum Corporation
How to Avoid The Biggest Electronic Evidence Mistakes Ken Jones Senior Technology Architect Pileum Corporation Why is Proper Handling of Electronic Data Important? Most of the evidence in your case isn
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
