Data leak analysis in a corporate environment

Seokhee Lee, Keungi Lee, Antonio Savoldi, Sangjin Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Digital Forensics focuses on the collection of evidence from the volatile and non-volatile memory of a computer-based system, such as the hard disk and the RAM content. Needless to say, hard disk data are crucial in the investigation, but whether hard disk data collection is possible or not depends on the features of the case, and whether the forensics practitioners have a suitable legal permission. As nowadays the capacity of hard disks is increasing more and more, it takes a considerable amount of time to perform the imaging phase, and thus to deal with different steps in the chain of custody of the case. As a consequence, delaying the collection step in the investigation may have a detrimental effect on the progress of the investigation or may be a barrier to succeed in the investigation. Hence, we suggest an efficient methodology to collect evidence for dealing with data leak cases, by substantially reducing the collection time.

Original languageEnglish
Title of host publication2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009
Pages38-43
Number of pages6
DOIs
Publication statusPublished - 2009 Dec 1
Event2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009 - Kaohsiung, Taiwan, Province of China
Duration: 2009 Dec 72009 Dec 9

Other

Other2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009
CountryTaiwan, Province of China
CityKaohsiung
Period09/12/709/12/9

Fingerprint

Hard disk storage
Random access storage
Computer systems
Imaging techniques
Data storage equipment

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Software

Cite this

Lee, S., Lee, K., Savoldi, A., & Lee, S. (2009). Data leak analysis in a corporate environment. In 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009 (pp. 38-43). [5412531] https://doi.org/10.1109/ICICIC.2009.154

Data leak analysis in a corporate environment. / Lee, Seokhee; Lee, Keungi; Savoldi, Antonio; Lee, Sangjin.

2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009. 2009. p. 38-43 5412531.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, S, Lee, K, Savoldi, A & Lee, S 2009, Data leak analysis in a corporate environment. in 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009., 5412531, pp. 38-43, 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009, Kaohsiung, Taiwan, Province of China, 09/12/7. https://doi.org/10.1109/ICICIC.2009.154
Lee S, Lee K, Savoldi A, Lee S. Data leak analysis in a corporate environment. In 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009. 2009. p. 38-43. 5412531 https://doi.org/10.1109/ICICIC.2009.154
Lee, Seokhee ; Lee, Keungi ; Savoldi, Antonio ; Lee, Sangjin. / Data leak analysis in a corporate environment. 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009. 2009. pp. 38-43
@inproceedings{def6c9274ff045fda1d0257b88d7be1e,
title = "Data leak analysis in a corporate environment",
abstract = "Digital Forensics focuses on the collection of evidence from the volatile and non-volatile memory of a computer-based system, such as the hard disk and the RAM content. Needless to say, hard disk data are crucial in the investigation, but whether hard disk data collection is possible or not depends on the features of the case, and whether the forensics practitioners have a suitable legal permission. As nowadays the capacity of hard disks is increasing more and more, it takes a considerable amount of time to perform the imaging phase, and thus to deal with different steps in the chain of custody of the case. As a consequence, delaying the collection step in the investigation may have a detrimental effect on the progress of the investigation or may be a barrier to succeed in the investigation. Hence, we suggest an efficient methodology to collect evidence for dealing with data leak cases, by substantially reducing the collection time.",
author = "Seokhee Lee and Keungi Lee and Antonio Savoldi and Sangjin Lee",
year = "2009",
month = "12",
day = "1",
doi = "10.1109/ICICIC.2009.154",
language = "English",
isbn = "9780769538730",
pages = "38--43",
booktitle = "2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009",

}

TY - GEN

T1 - Data leak analysis in a corporate environment

AU - Lee, Seokhee

AU - Lee, Keungi

AU - Savoldi, Antonio

AU - Lee, Sangjin

PY - 2009/12/1

Y1 - 2009/12/1

N2 - Digital Forensics focuses on the collection of evidence from the volatile and non-volatile memory of a computer-based system, such as the hard disk and the RAM content. Needless to say, hard disk data are crucial in the investigation, but whether hard disk data collection is possible or not depends on the features of the case, and whether the forensics practitioners have a suitable legal permission. As nowadays the capacity of hard disks is increasing more and more, it takes a considerable amount of time to perform the imaging phase, and thus to deal with different steps in the chain of custody of the case. As a consequence, delaying the collection step in the investigation may have a detrimental effect on the progress of the investigation or may be a barrier to succeed in the investigation. Hence, we suggest an efficient methodology to collect evidence for dealing with data leak cases, by substantially reducing the collection time.

AB - Digital Forensics focuses on the collection of evidence from the volatile and non-volatile memory of a computer-based system, such as the hard disk and the RAM content. Needless to say, hard disk data are crucial in the investigation, but whether hard disk data collection is possible or not depends on the features of the case, and whether the forensics practitioners have a suitable legal permission. As nowadays the capacity of hard disks is increasing more and more, it takes a considerable amount of time to perform the imaging phase, and thus to deal with different steps in the chain of custody of the case. As a consequence, delaying the collection step in the investigation may have a detrimental effect on the progress of the investigation or may be a barrier to succeed in the investigation. Hence, we suggest an efficient methodology to collect evidence for dealing with data leak cases, by substantially reducing the collection time.

UR - http://www.scopus.com/inward/record.url?scp=77951487482&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77951487482&partnerID=8YFLogxK

U2 - 10.1109/ICICIC.2009.154

DO - 10.1109/ICICIC.2009.154

M3 - Conference contribution

AN - SCOPUS:77951487482

SN - 9780769538730

SP - 38

EP - 43

BT - 2009 4th International Conference on Innovative Computing, Information and Control, ICICIC 2009

ER -