Главная
Study mode:
on
1
Intro
2
Data Loss
3
Data is not secure
4
Can we obtain sensitive data
5
What do we do with hardware
6
I hate Apple
7
FTK Imager
8
Data Destruction
9
Social Media Sites
10
Results
11
Metasploit
12
What I found
13
Other companies
Description:
Explore techniques for obtaining sensitive data without unauthorized access in this 53-minute conference talk from DerbyCon 4. Delve into topics such as data loss prevention, hardware handling, Apple device challenges, FTK Imager usage, data destruction methods, social media site vulnerabilities, and Metasploit applications. Learn about real-world findings and their implications for various companies' data security practices. Gain insights into ethical data acquisition methods and understand the importance of robust information security measures in today's digital landscape.

Give Me Your Data - Obtaining Sensitive Data Without Breaking In

Add to list