Data theft: Difference between revisions

Content deleted Content added
m Reverted edits by 194.74.136.2 (talk) to last version by Gilliam
Line 10:
The phrase ''data theft'' is actually a misnomer, since unlike [[theft]] the typical data theft methods typically do not deprive the owner of their data, but rather create an additional, unauthorized copy.
 
===GAYThumbsucking===
Thumbsucking, similar to podslurping, is the intentional or undeliberate use of a portable [[USB mass storage device class|USB mass storage device]], such as a [[USB flash drive]] (or "thumbdrive"), to illicitly download confidential data from a network endpoint.<ref>{{cite web|url=http://www.thumbsuckingthreat.com/index.html |title=Do you know who is sucking data from your computer? |accessdate=15 February 2015 |deadurl=yes |archiveurl=https://web.archive.org/web/20070819080552/http://www.thumbsuckingthreat.com/index.html |archivedate=August 19, 2007 }}</ref>
 
Line 23:
Techniques to investigate data theft include [[stochastic forensics]], [[digital artifact]] analysis (especially of [[USB flash drive|USB drive]] artifacts), and other [[computer forensics]] techniques.
 
== WILLWrong IS GAYYYYterm ==
In some countries this term is incorrect because it is considered that theft is of a thing (material object) and [[information]] is not a thing. <ref>[http://www.infoleg.gov.ar/infolegInternet/anexos/105000-109999/109481/texactley340_libroIII_tituloI.htm Código civil Argentino art. 2311]</ref> <ref>[http://www.infoleg.gov.ar/infolegInternet/anexos/15000-19999/16546/texact.htm Código penal Argentino art. 164]</ref>