Premium Content

Access "The future of digital forensics"

RH4 NCatlin-1.jpg

Sponsored by ComputerWeekly.com

This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.  Access >>>

Table of contents

  • The three avenues of attack
  • Building an anti-forensic computer system
  • Defeating forced key disclosure

 

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Open Group technical document: IT Specialist Certification Accreditation Policy
    Open Group technical document - IT Specialist Certific Accreditation Policy.jpg
    E-Handbook

    Clearly “book learning” is a critical first step to becoming effective at anything. But the effectiveness, potential, and the degree and value of ...

  • Time to get serious about endpoint security
    CWE_220714_ezine_23p-1MED.jpg
    E-Zine

    In this week’s Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer’s guide looks at endpoint security. ...

  • CW500 IN THE CITY - Jason Scott-Taggart
    CWITC-1.jpg
    E-Handbook

    Jason Scott-Taggart, head of IT service management at Worldpay looks at how Barclays met the challenge of implementing technologies to support ...