Part 6 - Spoliation in the Field of Cyber

Video Activity

This lesson discusses spoliation in the field of cyber. Spoliation occurs when a person or company withholds, alters, hides or destroys evidence that is relevant to a criminal case. This can be intentional or via negligence. Examples of this include but are not limited to: 1. Deleting syslog files 2. Wiping smartphones 3. Re-imagining a desktop or ...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
48 minutes
Difficulty
Advanced
CEU/CPE
1
Video Description

This lesson discusses spoliation in the field of cyber. Spoliation occurs when a person or company withholds, alters, hides or destroys evidence that is relevant to a criminal case. This can be intentional or via negligence. Examples of this include but are not limited to: 1. Deleting syslog files 2. Wiping smartphones 3. Re-imagining a desktop or server 4. Reconfiguring firewalls

Video Transcription
00:04
In the next life, we will be dissecting some of the key elements of both the target and the Office of Personnel Management Breach.
00:11
But before we do,
00:13
we do need to address one last legal topic.
00:16
Exfoliation. So what is Foley ation? In layman's terms, you've been notified of the case against you.
00:23
And before you attempt to destroy or a move in any manner, any harmful evidence,
00:28
you are ordered to essentially quote unquote freeze in time
00:34
all operations
00:36
under the guidance of your legal representation.
00:39
So what might some examples include? It isn't just protecting email trails any longer
00:44
when facing a potential claim of harm. Make no mistake,
00:48
lawyers are increasingly becoming more student at to what to look for
00:53
and how soon in the process.
00:57
This Foley ation order usually rides on the heels of a subpoena or notice to appear in a court of law,
01:03
something that I cannot stress enough if we would have the reason that you think that you are smarter than the average bear and you want to roll the dice
01:11
if in the course of the leading information or D leaving system logs
01:17
if it was able to be found by opposing counsel that you manipulated the data.
01:23
Not only can you be fired from your job, but you can also be held criminally liable for a destruction of evidence.
Up Next