Flylib.com
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors:
John R. Vacca
BUY ON AMAZON
Table of Contents
BackCover
Computer Forensics-Computer Crime Scene Investigation
Foreword
Introduction
COMPUTER FORENSICS
PURPOSE
SCOPE
TARGET AUDIENCE
ORGANIZATION OF THIS BOOK
CONVENTIONS
Part I: Overview of Computer Forensics Technology
Chapter 1: Computer Forensics Fundamentals
WHAT IS COMPUTER FORENSICS?
USE OF COMPUTER FORENSICS IN LAW ENFORCEMENT
COMPUTER FORENSICS ASSISTANCE TO HUMAN RESOURCESEMPLOYMENTPROCEEDINGS
COMPUTER FORENSICS SERVICES
BENEFITS OF PROFESSIONAL FORENSICS METHODOLOGY
STEPS TAKEN BY COMPUTER FORENSICS SPECIALISTS
WHO CAN USE COMPUTER FORENSIC EVIDENCE?
CASE HISTORIES
CASE STUDIES
SUMMARY
Chapter 2: Types of Computer Forensics Technology
TYPES OF MILITARY COMPUTER FORENSIC TECHNOLOGY
TYPES OF LAW ENFORCEMENT: COMPUTER FORENSIC TECHNOLOGY
TYPES OF BUSINESS COMPUTER FORENSIC TECHNOLOGY
SUMMARY
Chapter 3: Types of Vendor and Computer Forensics Services
OCCURRENCE OF CYBER CRIME
CYBER DETECTIVES
FIGHTING CYBER CRIME WITH RISK-MANAGEMENT TECHNIQUES
COMPUTER FORENSICS INVESTIGATIVE SERVICES
FORENSIC PROCESS IMPROVEMENT
COURSE CONTENT
CASE HISTORIES
SUMMARY
Part II: Computer Forensics Evidence and Capture
Chapter 4: Data Recovery
DATA RECOVERY DEFINED
DATA BACK-UP AND RECOVERY
THE ROLE OF BACK-UP IN DATA RECOVERY
THE DATA-RECOVERY SOLUTION
CASE HISTORIES
SUMMARY
Chapter 5: Evidence Collection and Data Seizure
COLLECTION OPTIONS
OBSTACLES
TYPES OF EVIDENCE
THE RULES OF EVIDENCE
VOLATILE EVIDENCE
GENERAL PROCEDURE
COLLECTION AND ARCHIVING
METHODS OF COLLECTION
ARTEFACTS
COLLECTION STEPS
CONTROLLING CONTAMINATION: THE CHAIN OF CUSTODY
SUMMARY
Chapter 6: Duplication and Preservation of Digital Evidence
COMPUTER EVIDENCE PROCESSING STEPS
LEGAL ASPECTS OF COLLECTING AND PRESERVING COMPUTER FORENSIC EVIDENCE
SUMMARY
Chapter 7: Computer Image Verification and Authentication
SPECIAL NEEDS OF EVIDENTIAL AUTHENTICATION
PRACTICAL CONSIDERATION
PRACTICAL IMPLEMENTATION
SUMMARY
Part III: Computer Forensics Analysis
Chapter 8: Discovery of Electronic Evidence
ELECTRONIC DOCUMENT DISCOVERY: A POWERFUL NEW LITIGATION TOOL
SUMMARY
Chapter 9: Identification of Data
TIME TRAVEL
FORENSIC IDENTIFICATION AND ANALYSIS OF TECHNICAL SURVEILLANCE DEVICES
SUMMARY
Chapter 10: Reconstructing Past Events
HOW TO BECOME A DIGITAL DETECTIVE
USEABLE FILE FORMATS
UNUSABLE FILE FORMATS
CONVERTING FILES
SUMMARY
Chapter 11: Networks
NETWORK FORENSICS SCENARIO
A TECHNICAL APPROACH
DESTRUCTION OF E-MAIL
DAMAGING COMPUTER EVIDENCE
DOCUMENTING THE INTRUSION ON DESTRUCTION OF DATA
SYSTEM TESTING
SUMMARY
Part IV: Countermeasures-Information Warfare
Chapter 12: Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groups
IS THE UNITED STATES GOVERNMENT PREPARED FOR INFORMATION WARFARE?
ARE OTHER GOVERNMENTS PREPARED FOR INFORMATION WARFARE?
WHAT INDUSTRY GROUPS HAVE DONE TO PREPARE FOR INFORMATION WARFARE?
STRATEGIC DIPLOMACY AND INFORMATION WARFARE
THE ROLE OF INTERNATIONAL ORGANIZATIONS
THE ROLE OF THE GLOBAL MILITARY ALLIANCES
MARSHALL LAW AND CYBERSPACE
THE SUPER CYBER PROTECTION AGENCIES
SUMMARY
Chapter 13: The Information Warfare Arsenal and Tactics of the Military
OVERVIEW OF MILITARY TACTICS
OFFENSIVE RUINOUS INFORMATION WARFARE TOOLS AND TACTICS
OFFENSIVE CONTAINMENT INFORMATION WARFARE TOOLS AND TACTICS
DEFENSIVE PREVENTIVE INFORMATION WARFARE TOOLS AND TACTICS
DEFENSIVE RUINOUS INFORMATION WARFARE TOOLS AND TACTICS
DEFENSIVE RESPONSIVE CONTAINMENT INFORMATION WARFARE TOOLS AND TACTICS
COUNTERING SUSTAINED TERRORIST INFORMATION WARFARE TACTICS
DEALING WITH RANDOM TERRORIST INFORMATION WARFARE
SUMMARY
Chapter 14: The Information Warfare Arsenal and Tactics of Terrorists and Rogues
THE TERRORIST PROFILE
From Vietnam Marches to Cyberdisobedience
GROW UP
WHY TERRORIST AND ROGUES HAVE AN ADVANTAGE IN IW
THE CRIMINAL CAF IN CYBERSPACE
THE SUPER COMPUTER LITERATE TERRORIST
THE BRILLIANT AND NASTY ROGUE
HOW THEY WATCH AND WHAT THEY KNOW
HOW AND WHERE THEY GET THEIR TOOLS
WHY TOOLS ARE EASY TO GET AND USE
WHY NASTY PEOPLE ARE SO HARD TO TRACK DOWN AND CAPTURE
WHAT THEY WILL DO NEXT-THE INFORMATION WARFARE GAMES
SUMMARY
Chapter 15: The Information Warfare Arsenal and Tactics of Private Companies
OVERVIEW OF DEFENSIVE TACTICS PRIVATE COMPANIES CAN TAKE
SURVIVING OFFENSIVE RUINOUS INFORMATION WARFARE
SURVIVING OFFENSIVE CONTAINMENT INFORMATION WARFARE
PARTICIPATING IN DEFENSIVE PREVENTIVE INFORMATION WARFARE PLANNING
BENEFITING FROM AND SURVIVING DEFENSIVE RUINOUS INFORMATION WARFARE
BENEFITING FROM AND SURVIVING DEFENSIVE ESPONSIVE CONTAINMENT INFORMATION WARFARE
PROTECTION AGAINST RANDOM TERRORIST INFORMATION WARFARE TACTICS
WHAT TO DO WHEN TERRORISTS KEEP ATTACKING
COUNTERING SUSTAINED ROGUE INFORMATION WARFARE
PROTECTION AGAINST RANDOM ROGUE INFORMATION WARFARE
KEEPING THE AMATEUR ROGUE OUT OF THE CYBER HOUSE
SUMMARY
Chapter 16: Information Warfare: Arsenal of the Future
YOU HAVEN T SEEN ANYTHING LIKE WHAT IS COMING
NEW TOYS FOR BIG BROTHER AND THE BOYS
SNOOP, SNIFF, AND SNUFF TOOLS
BEWARE: E-MAIL WIRETAPS LIKE CARNIVORE CAN STEAL SENSITIVE CORRESPONDENCE
SPY DUST BALLS AND MECHANICAL DRAGONFLIES
NANOTECHNOLOGY
SUMMARY
Chapter 17: Surveillance Tools for Information Warfare of the Future
MONITORING EVERYTHING
CYBER SURVEILLANCE
THE CYBER FOOT PRINT AND CRIMINAL TRACKING
THE IMPLICATIONS OF COOKIES AND INTEGRATED PLATFORMS
WINTEL INSIDE, OR HOW YOUR COMPUTER IS WATCHING YOU
DATA MINING FOR WHAT?
THE INTERNET IS BIG BROTHER
THE WIRELESS INTERNET-FRIEND OR FOE?
SUMMARY
Chapter 18: Civilian Casualties-The Victims and Refugees of Information Warfare
WHAT THE CYBER MASSES HAVE TO LOSE
THE DESTRUCTION OF PERSONAL ASSETS IN INFORMATION WARS
THE VIOLATION OF PRIVACY DURING INFORMATION WARS
THE INDIVIDUAL EXPOSED
UNCOVERING SECRET IDENTITIES
THE MONITORING OF PRIVATE AFFAIRS IN CYBER SPACE
THE NEW ORDER AND STATE MEDICAL ID CARDS
BIG BROTHER IS HERE AND IS STAYING
SUMMARY
Part V: Results and Future Directions
Chapter 19: Advanced Computer Forensics
ADVANCED ENCRYPTION: THE NEED TO CONCEAL
ADVANCED HACKING
ADVANCED TRACKER HACKERS
SOURCE ADDRESSES
THE PROBLEMS OF THE PRESENT
THE OUTLOOK FOR THE FUTURE
SUMMARY
Chapter 20: Summary, Conclusions, and Recommendations
SUMMARY
CONCLUSIONS
RECOMMENDATIONS
HOW DOS ATTACKS WORK
FINAL WORD: COMPUTER FORENSIC NEEDS AND CHALLENGES
Part VI: Appendices
Appendix A: Frequently Asked Questions
WHY COMPUTER FORENSICS?
WHAT IS DATA RECOVERY?
ARE THERE INSTANCES WHERE DATA CANNOT BE RECOVERED?
Appendix B: Computer Forensics Resources
COMPUTER CRIME
FILE FORMATS AND EXTENSIONS
CRYPTOGRAPHY AND STEGANOGRAPHY
Appendix C: Links to Computer Forensics and Related Law Enforcement Web Pages
ORGANIZATIONS
MAILING LISTS
USDOJ GUIDELINES FOR SEARCHING SEIZING COMPUTERS
COMPUTER FORENSIC AND SECURITY SOFTWARE AVAILABLE FREE OF CHARGE TO LAW ENFORCEMENT AGENCIES
MISCELLANEOUS
INFOWAR, INFO-SEC PORTAL, INFORMATION WARFARE SECURITY GLOBAL CLEARINGHOUSE,
Appendix D: More Computer Forensics Cases
CASE STUDY 2: CORRUPTED FILES
CASE STUDY 3: DISAPPEARING FILES
CASE STUDY 4: COMPUTER FORENSICS
CASE STUDY 5: FORENSIC ACCOUNTING
CASE STUDY 6: CORPORATE INVESTIGATION INTO PC PORNOGRAPHY
CASE STUDY 7: DATA RECOVERY
CASE STUDY 8: INDUSTRIAL ESPIONAGE
CASE STUDY 9: FAMILY MEMBERS BOLT
CASE STUDY 10: FORMER EMPLOYER
CASE STUDY 11: GOODS LEFT TO ROT
CASE STUDY 12: MANAGERS START NEW COMPANY
CASE STUDY 13: FAMILY MEMBER STEALS CLIENTS
CASE STUDY 14: ERASED E-MAIL
CASE STUDY 15: BANK SUSPECTS
CASE STUDY 16: FORMER MANAGERS
CASE STUDY 17: FORMER CATALOG DESIGNERS
CASE STUDY 18: MODEL PURSUED
CASE STUDY 19: ENCRYPTED MAIL
CASE STUDY 20: TWO ATTORNEYS CAN T SPEAK CIVILLY
CASE STUDY 21: BIG REAL ESTATE DEAL
CASE STUDY 22: DOCTOR ACCUSED
CASE STUDY 23: FORMER EMPLOYEE CLAIMS
CASE STUDY 24: EX-PARTNER CLAIMS
CASE STUDY 25: FORMER MANAGER
Appendix E: On the CD-ROM
Glossary of Terms and Acronyms
A
B-C
D
E-F
G-I
J-M
N-P
R-S
T-V
W-Z
Index
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_Y
Index_Z
List of Figures
List of Tables
List of Sidebars
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors:
John R. Vacca
BUY ON AMAZON
CompTIA Project+ Study Guide: Exam PK0-003
Scope Planning
Schedule Planning
Cost Planning
Other Planning Processes
Appendix B Standard IT Project Documents
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Measuring ROI in E-Commerce Applications: Analysis to Action
Governing Information Technology Through COBIT
Governance in IT Outsourcing Partnerships
SQL Hacks
Hack 9. Filter on Indexed Columns
Hack 17. Solve Anagrams
Hack 53. Clean Inconsistent Records
Hack 80. Play Six Degrees of Kevin Bacon
Hack 93. Auto-Create Database Users
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Crash Course in the Internet Protocol Suite
Unauthorized Activity I
Tcpdump
Data Correlation
The Future of Intrusion Detection and Prevention
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 64. Bridge Your Linux AP
Section A.5. 802.16: WiMAX Long Distance Wireless Infrastructure
Section A.7. 900 MHz: Low Speed, Better Coverage
Section B.1. Microwave Cabling
Section B.5. 802.11 Hardware Suppliers
What is Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #3: Work Together for Maximum Gain
Beyond the Basics: The Five Laws of Lean Six Sigma
When Companies Start Using Lean Six Sigma
Six Things Managers Must Do: How to Support Lean Six Sigma
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies