<p><span>This book takes a unique approach by exploring the connection between cybersecurity, digitalization, and business intelligence. In today's digital landscape, cybersecurity is a crucial aspect of business operations. Meanwhile, organizations continue to leverage digital technologies for thei
Big Digital Forensic Data: Volume 2: Quick Analysis for Evidence and Intelligence (SpringerBriefs on Cyber Security Systems and Networks)
β Scribed by Darren Quick, Kim-Kwang Raymond Choo
- Publisher
- Springer
- Year
- 2018
- Tongue
- English
- Leaves
- 97
- Edition
- 1st ed. 2018
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big digital forensic data analysis for evidence and intelligence. It includes the results of experiments on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.
β¦ Table of Contents
Preface
Acknowledgements
Contents
Abbreviations
Keywords
1 Introduction
References
2 Quick Analysis of Digital Forensic Data
2.1 Digital Forensic Quick Analysis Methodology
2.1.1 Physical Examination
2.1.2 Quick Analysis
2.2 Quick Analysis of Test Data
2.3 Quick Analysis of Real World Digital Forensic Subsets
2.3.1 Quick Analysis with EnCase on Real World Data
2.3.2 Processing with NUIX on Real World Data
2.4 Discussion
2.5 Summary
References
3 Digital Forensic Data and Intelligence
3.1 Intelligence Analysis and Digital Intelligence
3.2 Digital Forensic Intelligence
3.3 Mobile Phone and Portable Storage Growth 2003β2018
3.3.1 South Australia PoliceβElectronic Evidence 2000β2015
3.3.2 FBI Regional Computer Forensic Labs 2006β2013
3.4 IoT Devices
3.5 Discussion
3.6 Conclusion
3.7 Summary
References
4 Data Reduction of Mobile Device Extracts
4.1 Digital Forensic Intelligence Analysis
4.2 Mobile Phone Extracts
4.2.1 MSAB XRY 6.12.1
4.2.2 Oxygen Forensic Suite 6.4.0.67
4.2.3 Cellebrite UFED 3.9.2.4
4.2.4 Guidance Software EnCase 7.09.04
4.2.5 Paraben Device Seizure 6.66
4.2.6 Internet Evidence Finder (IEF) 6.4.2.0070
4.2.7 Summary of Mobile Phone Exports
4.3 Digital Forensic Intelligence Analysis of Test Data
4.4 Review of South Australia Police Data
4.4.1 Data Volume of South Australia Police XRY Extracts
4.4.2 Extract Time from South Australia Police XRY Data
4.4.3 Summary of South Australia Police Data
4.5 Discussion
4.6 Summary
References
5 Digital Forensic Data and Open Source Intelligence (DFINT+OSINT)
5.1 The Role of Intelligence
5.1.1 Intelligence-Led Policing (ILP)
5.1.2 Open Source Intelligence
5.1.3 Digital Forensic Intelligence + OSINT
5.2 DFINT+OSINT Method
5.3 Results: Digital Intelligence and OSINT from M57 Test Data
5.4 Applying DFINT+OSINT to Real World Data
5.5 Discussion
5.6 Summary
References
6 Summary
6.1 Conclusion
References
π SIMILAR VOLUMES
<p><span>In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromised data and sufficient losses. Massive los
<p><span>This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are no
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering systems that are robust to attack. However, no system can be made invulnerable. Data Analysis for Network Cyber-Security focuses on monitoring and analyz
<span>This book describes the potential contributions of emerging technologies in different fields as well as the opportunities and challenges related to the integration of these technologies in the socio-economic sector. In this book, many latest technologies are addressed, particularly in the fiel