Encryption, Encoding, Inaccessible Data and Devices
Duration: 75 Minutes
Recorded June 2,
Hash, encryption, full disk, file based, and the list
goes on! Words used correctly and incorrectly when examiners discuss or even
report on evidence. This webinar is intended to lay the framework for a
factual understanding of how encryption and hashing are used in our
digital investigations. Real-world applications of hashing, and encryption will be
shown, with an emphasis on how they impact investigations in 2020. Questions
such as: "Does the application encrypt data?", "How is it encrypted?", and "Why
can’t I decrypt it?" will be discussed.
Chris Atha, NW3C
(Limit 100 character max.)
OPTIONAL: Check this if you agree that NW3C may share my Personally Identifiable Information.