Cargando…

Cybercrime investigators handbook /

"This book provides the reader with the knowledge and investigative methodology on how to investigate cybercrime from a field practitioner's perspective. Cybercrime is aggressively targeting governments, businesses and individuals of all levels in increasing numbers, law enforcement can pr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Edwards, Graeme (Financial and cybercrime investigator) (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, Inc., [2020]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_on1110137635
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |||||||||||
008 190719s2020 nju o 001 0 eng
010 |a  2019023232 
040 |a DLC  |b eng  |e rda  |c DLC  |d OCLCF  |d EBLCP  |d DG1  |d RECBK  |d AU@  |d UKAHL  |d N$T  |d DLC  |d OCLCO  |d OCLCQ  |d YDX  |d VLY  |d K6U  |d OCLCO  |d IEEEE  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1119730766  |a 1120941579  |a 1143414018 
020 |a 9781119596301  |q (epub) 
020 |a 1119596300 
020 |a 9781119596325  |q (adobe pdf) 
020 |a 1119596327 
020 |a 9781119596318  |q (electronic bk.) 
020 |a 1119596319  |q (electronic bk.) 
020 |z 9781119596288  |q (cloth) 
020 |z 1119596289 
024 7 |a 10.1002/9781119596318  |2 doi 
029 1 |a CHVBK  |b 57592392X 
029 1 |a CHNEW  |b 001065503 
029 1 |a AU@  |b 000066106545 
029 1 |a AU@  |b 000065844768 
029 1 |a AU@  |b 000067625836 
035 |a (OCoLC)1110137635  |z (OCoLC)1119730766  |z (OCoLC)1120941579  |z (OCoLC)1143414018 
037 |a 9820837  |b IEEE 
042 |a pcc 
050 0 0 |a HV8079.C65 
082 0 0 |a 363.25/968  |2 23 
049 |a UAMI 
100 1 |a Edwards, Graeme  |c (Financial and cybercrime investigator),  |e author. 
245 1 0 |a Cybercrime investigators handbook /  |c Graeme Edwards, PhD. 
264 1 |a Hoboken, New Jersey :  |b John Wiley & Sons, Inc.,  |c [2020] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b n  |2 rdamedia 
338 |a online resource  |b nc  |2 rdacarrier 
500 |a Includes index. 
520 |a "This book provides the reader with the knowledge and investigative methodology on how to investigate cybercrime from a field practitioner's perspective. Cybercrime is aggressively targeting governments, businesses and individuals of all levels in increasing numbers, law enforcement can provide only limited support and civilian investigators have to take responsibility for investigating their own crimes. While there are very high-quality manuals for conducting digital examinations on a device or network that has been hacked, there is no known guide for those who want to use this information to commence an investigation from the location the offence occurred with the intention of location and prosecuting the attacker. That is, from the cybercrime scene. This book provides a valuable contribution to the actual practical ground level investigation including evidence location, lawful seizure, preservation, examination, interpretation and management. These are core duties which if not completed correctly, leads to poor quality and incomplete investigations. It is believed this handbook will sit alongside the other texts stated and fill the gap in the marketplace where the front-line investigator has limited guidance on how to react at the cybercrime scene whilst the offence is occurring. In addition, this book will also help those companies that are GDPR (General Data Protection Regulation, a European Union regulation that instituted new new rules governing the use and manipulation of personal data) follow a plan if their data is compromised"--  |c Provided by publisher. 
588 |a Description based on print version record and CIP data provided by publisher. 
505 0 |a Cover; Title Page; Copyright; Contents; List of Figures; About the Author; Foreword; Acknowledgments; Chapter 1 Introduction; Chapter 2 Cybercrime Offenses; Potential Cybercrime Offenses; Industrial Espionage; Theft of Information Such as Identities, Staff Files, and Accounts; Computer Hacking to Gain Access to System Resources; Gaining or Exceeding Authorized Access Levels to Obtain Highly Restricted Data; Exploiting Information Security Weaknesses through the Supply Chain, Including Third-Party Contractors; Stealing Credit Card Data for Selling Online, or Card-Not-Present Fraud 
505 8 |a Gaining Access to a System or Device through Malicious SoftwareDamaging the Reputation of a Competitor to Gain a Market Advantage; Changes to Computer Systems or Devices; Vandalism to Prove the Skills of the Attacker; Drive-by Downloads of Malicious Software; Interfering with Access to a Network; Ransomware; Phishing Attacks and Money Laundering; Business Email Compromise Fraud; Social Engineering Fraud; Cybercrime Case Study; Notes; Chapter 3 Motivations of the Attacker; Common Motivators; Revenge; Opportunity; Greed; Test of Skill; Business Competitor; Professional Criminal 
505 8 |a Issue-Motivated AttackerGeopolitics; Terrorism; Cybercrime Case Study I; Cybercrime Case Study II; Note; Chapter 4 Determining That a Cybercrime Is Being Committed; Cyber Incident Alerts; Attack Methodologies; Cybercrime Case Study I; Cybercrime Case Study II; Notes; Chapter 5 Commencing a Cybercrime Investigation; Why Investigate a Cybercrime?; The Cyber Investigator; Management Support; Is There a Responsibility to Try to Get the Data Back?; Cybercrime Case Study; Notes; Chapter 6 Legal Considerations When Planning an Investigation; Role of the Law in a Digital Crimes Investigation 
505 8 |a Protecting Digital EvidencePreservation of the Chain of Custody; Protection of Evidence; Legal Implications of Digital Evidence Collection; Cybercrime Case Study; Note; Chapter 7 Initial Meeting with the Complainant; Initial Discussion; Complainant Details; Event Details; Cyber Security History; Scene Details; Identifying Offenses; Identifying Witnesses; Identifying Suspects; Identifying the Modus Operandi of Attack; Evidence: Technical; Evidence: Other; Cybercrime Case Study; Chapter 8 Containing and Remediating the Cyber Security Incident; Containing the Cyber Security Incident 
505 8 |a Eradicating the Cyber Security IncidentNote; Chapter 9 Challenges in Cyber Security Incident Investigations; Unique Challenges; Defining Investigation Boundaries and Management Objectives; Identifying Potential Offenses (Criminal and/or Civil); Identifying Compromised Data and/or Resources; Identifying Suspects and Motivations; Identifying Exploited Vulnerabilities; Securing Evidence; Understanding the Legal Jurisdiction Where the Incident Occurred and the Evidence Exists; Locating Digital Evidence in a Timely Manner; Maintaining the Chain of Evidence across Multiple Jurisdictions 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer crimes  |x Investigation. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 7 |a BUSINESS & ECONOMICS  |x Corporate Finance  |x General.  |2 bisacsh 
650 7 |a Computer crimes  |x Investigation  |2 fast 
758 |i has work:  |a Cybercrime investigators handbook (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFQY3CgP7XvkgCV89Y6R8C  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Edwards, Graeme (Financial and cybercrime investigator).  |t Cybercrime investigators handbook  |d Hoboken, New Jersey : John Wiley & Sons, Inc., [2019]  |z 9781119596288  |w (DLC) 2019023231 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5896937  |z Texto completo 
938 |a YBP Library Services  |b YANK  |n 16322818 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00780203 
938 |a EBSCOhost  |b EBSC  |n 2251615 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5896937 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36588222 
938 |a YBP Library Services  |b YANK  |n 300826799 
994 |a 92  |b IZTAP