Cargando…

Investigative Computer Forensics : the Practical Guide for Lawyers, Accountants, Investigators, and Business Executives.

Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marrie...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Laykin, Erik
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Chichester : Wiley, 2013.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Title Page; Copyright; Dedication; Foreword; Preface; Acknowledgments; Author's Note; Introduction: Investigative Computer Forensics; Changes in Technology; Changes in the Role of the Investigator; What Is Computer Forensics?; Chapter 1: The Glue; The Relevancy of Truth; Foundations of Digital Evidence; Investigative Objectives; The Investigative Process; Trust; Privacy; Chapter 2: A Primer on Computers and Networks; The Mechanics of Electronically Stored Information; Optical Drives; The Server; The Router; Application Data; Metadata; Databases; Internet Data; E-mail Mechanics.
  • The IP AddressComputer Time Artifacts; Social Media; Tablets; Cellular Telephones and Smartphones; Audio and Video; The Global Nervous System: Worldwide Data; Fundamentals of Network Traffic; The Firewall; Data- and Traffic-Gathering Applications; Dynamic Data Capture; The Cloud; International Data Security and Privacy Issues; Chapter 3: Computer Forensic Fundamentals; The Establishment of the Computer Forensic Laboratory; Evidence and Access Controls; The Forensic Workstation; Current Tools and Services; Building a Team and a Process; Computer Forensic Certifications; The Human Quotient.
  • The Devil Is in the DetailsChapter 4: Investigative Fundamentals; The Investigative Mind-Set; Case Management; Fraud and Investigative Analysis; Information Sources and Records; Investigative Techniques; Surveillance and Interviewing; Trade Secret Theft and IP Investigations; Human Resources and Interpersonal Investigations; Reporting and Testifying; Chapter 5: The Underpinnings of Investigative Computer Forensics; Seizure and Examination of Digital Evidence; Data Classification and Records Management; Deleted Data; Backups and Systems Preservation; Computer Crime Analysis and Reconstruction.
  • The Who, What, Where, How of DataContracts Agreements, Third Parties, and Other Headaches; Ethics and Management; Chapter 6: Tactical Objectives and Challenges in Investigative Computer Forensics; Preparing for the Attack; Early Case Assessment; Investigative Pacing, Timing, and Setting Expectations; Working with Multinational Teams; Collections of Electronic Data in the Cloud and in Social Media; Investigating Internet Service Provider Records; Bridging the Actual World with the Cyberworld; Packaging the Findings; Chapter 7: The Cyber-Firefighters; Incident Response Fundamentals.
  • Data BreachesTheft and Fraud; Systems Failures; Internal Investigations; The Real-Time Predicament; Building a Global Resource Network; Honeypots and Other Attractive Intel-Gathering Targets; Databases and Structured Data; Organized Crime in the Cyber-Underworld; The Cyber-Underworld in Various Regions; State-Sponsored Cybercrime; Identity Theft; Intellectual Property and Trade Secret Theft; Botnets, Malware, Trojans, and Phishing; Data Breach Vulnerabilities; Hackers and Their Environment; Chapter 8: E-Discovery Responsibilities; Data Identification; Electronic Discovery Reference Model.