Encryption, Encoding, Inaccessible Data and Devices
Duration: 75 Minutes
Recorded June 2,
Hash, encryption, full disk, file based, and the list goes
on! Words used correctly and incorrectly when examiners discuss or even report
on evidence. This webinar is intended to lay the framework for a factual
understanding of how encryption and hashing are used in our digital
investigations. Real world applications of hashing, and encryption will be
shown, with an emphasis on how they impact investigations in 2020. Questions
such as: "Does the application encrypt data?", "How is it encrypted?", and "Why
can’t I decrypt it?" will be discussed.
Presented by: Chris Atha, NW3C
(Limit 100 character max.)
OPTIONAL: Check this if you agree that NW3C may share my Personally Identifiable Information.