Cargando…

Cybercrime investigators handbook /

"This book provides the reader with the knowledge and investigative methodology on how to investigate cybercrime from a field practitioner's perspective. Cybercrime is aggressively targeting governments, businesses and individuals of all levels in increasing numbers, law enforcement can pr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Edwards, Graeme (Financial and cybercrime investigator) (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, Inc., [2020]
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Title Page; Copyright; Contents; List of Figures; About the Author; Foreword; Acknowledgments; Chapter 1 Introduction; Chapter 2 Cybercrime Offenses; Potential Cybercrime Offenses; Industrial Espionage; Theft of Information Such as Identities, Staff Files, and Accounts; Computer Hacking to Gain Access to System Resources; Gaining or Exceeding Authorized Access Levels to Obtain Highly Restricted Data; Exploiting Information Security Weaknesses through the Supply Chain, Including Third-Party Contractors; Stealing Credit Card Data for Selling Online, or Card-Not-Present Fraud
  • Gaining Access to a System or Device through Malicious SoftwareDamaging the Reputation of a Competitor to Gain a Market Advantage; Changes to Computer Systems or Devices; Vandalism to Prove the Skills of the Attacker; Drive-by Downloads of Malicious Software; Interfering with Access to a Network; Ransomware; Phishing Attacks and Money Laundering; Business Email Compromise Fraud; Social Engineering Fraud; Cybercrime Case Study; Notes; Chapter 3 Motivations of the Attacker; Common Motivators; Revenge; Opportunity; Greed; Test of Skill; Business Competitor; Professional Criminal
  • Issue-Motivated AttackerGeopolitics; Terrorism; Cybercrime Case Study I; Cybercrime Case Study II; Note; Chapter 4 Determining That a Cybercrime Is Being Committed; Cyber Incident Alerts; Attack Methodologies; Cybercrime Case Study I; Cybercrime Case Study II; Notes; Chapter 5 Commencing a Cybercrime Investigation; Why Investigate a Cybercrime?; The Cyber Investigator; Management Support; Is There a Responsibility to Try to Get the Data Back?; Cybercrime Case Study; Notes; Chapter 6 Legal Considerations When Planning an Investigation; Role of the Law in a Digital Crimes Investigation
  • Protecting Digital EvidencePreservation of the Chain of Custody; Protection of Evidence; Legal Implications of Digital Evidence Collection; Cybercrime Case Study; Note; Chapter 7 Initial Meeting with the Complainant; Initial Discussion; Complainant Details; Event Details; Cyber Security History; Scene Details; Identifying Offenses; Identifying Witnesses; Identifying Suspects; Identifying the Modus Operandi of Attack; Evidence: Technical; Evidence: Other; Cybercrime Case Study; Chapter 8 Containing and Remediating the Cyber Security Incident; Containing the Cyber Security Incident
  • Eradicating the Cyber Security IncidentNote; Chapter 9 Challenges in Cyber Security Incident Investigations; Unique Challenges; Defining Investigation Boundaries and Management Objectives; Identifying Potential Offenses (Criminal and/or Civil); Identifying Compromised Data and/or Resources; Identifying Suspects and Motivations; Identifying Exploited Vulnerabilities; Securing Evidence; Understanding the Legal Jurisdiction Where the Incident Occurred and the Evidence Exists; Locating Digital Evidence in a Timely Manner; Maintaining the Chain of Evidence across Multiple Jurisdictions