𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

CyberForensics: Understanding Information Security Investigations

✍ Scribed by Jennifer Bayuk (auth.), Jennifer Bayuk (eds.)


Publisher
Humana Press
Year
2010
Tongue
English
Leaves
175
Series
Springer’s Forensic Laboratory Science Series
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the decades since, cybercrime has emerged from the obscurity of low-level prosecution evidence to become a serious cross-border crime issue, while cyberforensic investigators have moved on from drug, murder, and child pornography crimes that were facilitated by computers, and are now tackling headline-grabbing cyber bank robbery, identity theft, and corporate spying. With little consensus as yet on the qualifications required to become a cyberforensic investigator, Cyberforensics: Understanding Information Security Investigations assembles the varying perspectives of pioneers and key figures in the field. All the authors have more than 10 years’ experience in successfully investigating cybercrime, and some more than 20. Through real-life case studies the chapters introduce the reader to the field of cybersecurity, starting with corporate investigation, and progressing to analyze the issues in more detail. Taking us from accounting cyberforensics to unraveling the complexities of malware, the contributors explain the tools and techniques they use in a manner that allows us to map their methodology into a more generic understanding of what a cybersecurity investigation really is. Above all, Cyberforensics shows that there is a cohesive set of concepts that binds cybersecurity investigators to a shared vision. These core ideas are now gaining importance as a body of knowledge that cyberforensics professionals agree should be a prerequisite to the professional practice of information security.

✦ Table of Contents


Front Matter....Pages i-xiv
Introduction....Pages 1-6
The Complex World of Corporate CyberForensics Investigations....Pages 7-27
Investigating Large-Scale Data Breach Cases....Pages 29-43
Insider Threat Investigations....Pages 45-51
Accounting Forensics....Pages 53-57
Analyzing Malicious Software....Pages 59-83
Network Packet Forensics....Pages 85-101
RAM and File Systems Investigations....Pages 103-116
One Picture is Worth a Million Bytes....Pages 117-128
Cybercrime and Law Enforcement Cooperation....Pages 129-139
Technology Malpractice....Pages 141-148
Back Matter....Pages 149-167

✦ Subjects


Forensic Science; Computer Science, general; e-Commerce/e-business


πŸ“œ SIMILAR VOLUMES


CyberForensics: Understanding Informatio
✍ Jennifer Bayuk (editor) πŸ“‚ Library πŸ“… 2010 πŸ› Humana 🌐 English

<span>Cyberforensics is a fairly new word in the technology our industry, but one that n- ertheless has immediately recognizable meaning. Although the word forensics may have its origins in formal debates using evidence, it is now most closely associated with investigation into evidence of crime. As

Understanding DB2 9 security: DB2, infor
✍ Bond, Rebecca;See, Kevin Yeung-Kuen;Wong, Carmen Ka;Chan, Yuk-Kuen Henry πŸ“‚ Library πŸ“… 2006;2007 πŸ› IBM Press/Pearson 🌐 English

Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM(R) DB2 development team, this book gives DBAs and their managers a wealth of security information that is

Understanding Secured Transactions (Unde
✍ William Lawrence, William Henning, R. Wilson Freyermuth πŸ“‚ Library πŸ“… 2012 πŸ› Carolina Academic Press 🌐 English

<p><span>This </span><span>Understanding </span><span>treatise provides students with an analysis of the underlying rationales of Article 9 of the Uniform Commercial Code, the federal Bankruptcy Code as it relates to Article 9, and other relevant state and federal legislation. Familiarity with these