Sponsored by ComputerWeekly.com
This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption. Access >>>
Table of contents
- The three avenues of attack
- Building an anti-forensic computer system
- Defeating forced key disclosure
Premium Content for Free.
More Premium Content Accessible For Free
Memory corruption attacks
Lack of diversity in software and operating systems over many years has left a large number of computers vulnerable to memory program attacks. A ...
Tactics to combat insider threat
This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a ...
Social Media: IT Purchasers get social, marketers play catch up ?
IT decision makers are using social media effectively at work, but marketers are playing catch up, according to this research snapshot.