Digital forensics explained

This book covers the full life cycle of conducting a mobile and computer digital forensic examination, including planning and performing an investigation as well as report writing and testifying. Case reviews in corporate, civil, and criminal situations are also described from both prosecution and d...

Descripción completa

Detalles Bibliográficos
Otros Autores: Gogolin, Greg, editor (editor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton, Florida ; London ; New York : CRC Press [2021]
Edición:Second edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009757912506719
Tabla de Contenidos:
  • Cover
  • Half Title
  • Title Page
  • Copyright Page
  • Table of Contents
  • Preface
  • Acknowledgments
  • Author
  • Contributors
  • 1 What is digital forensics, and what should you know about it?
  • Introduction
  • Forensic science
  • What does it take to be a digital forensic investigator?
  • Educational opportunities
  • What opportunities are there for digital forensic investigators?
  • What are the trends and challenges in digital forensics?
  • Resources available to digital forensic investigators
  • Conclusion
  • References
  • 2 Digital forensic approaches and best practices
  • Introduction
  • First response
  • Responding to a case
  • Conclusion
  • References
  • Other useful resources
  • 3 Digital forensics tool kit
  • Introduction
  • Computer forensics
  • Write blockers
  • Imaging
  • Add-ons and other technologies
  • Tools
  • Mobile forensics tools
  • Visual analysis
  • Secured storage
  • Damaged media
  • Summary
  • References
  • 4 Internet and e-mail examinations
  • Introduction
  • E-mail
  • Chat and messaging logs
  • Peer-to-peer
  • Search engine activity
  • Internet history
  • Social networking and gaming
  • Malware and viruses
  • Summary
  • 5 Mobile forensics
  • Introduction
  • Mobile phone technology
  • How a call is made
  • Forensic challenges
  • Forensic process
  • Digital cell phone investigation
  • Geographic positioning systems
  • Cameras
  • Common extraction types
  • Information sources and location information
  • Summary
  • Cellular communications technology overview
  • References
  • 6 Cloud computing and digital forensics
  • Introduction
  • Infrastructure as a service
  • Platform as a service
  • Software as a service
  • Service and deployment models
  • Customer versus cloud provider responsibilities
  • Other service models
  • Multi-tenancy
  • User access and provisioning
  • Data protection and breaches.
  • Information technology and information security governance and change control processes
  • Service access vulnerabilities
  • Migration planning
  • Incident response
  • Virtualization
  • Security benefits of cloud
  • 7 Law enforcement incident response
  • Introduction
  • Case summary
  • The initiation of an investigation
  • Information
  • Evidence gathering
  • Interviews and the analysis of evidence
  • Analysis of the electronic evidence
  • Prosecution and testimony
  • Things to consider
  • Conclusion
  • 8 Report writing and presentation
  • Introduction
  • Report content and considerations
  • Sample reports
  • Presenting and testifying
  • Dr. Otting's thoughts on criminal case testimony
  • Archiving
  • Summary
  • 9 Social media forensics
  • Introduction
  • Introduction to social media
  • Social networking
  • Micro blogs
  • Multimedia sharing
  • Instant messaging and communication
  • Blogs
  • Event coordination
  • Location identification
  • Search
  • Wikis
  • Web conferencing
  • Virtual worlds
  • Social media forensics
  • Street gangs
  • Terrorist activity
  • White collar crimes
  • Summary
  • References
  • 10 Social engineering forensics
  • Introduction
  • Introduction to social engineering
  • Online social engineering attacks
  • Telephone social engineering attacks
  • Waste management social engineering attacks
  • Mobile device social engineering attacks
  • Personal social engineering attacks
  • Reverse social engineering attacks
  • Social engineering forensics
  • Summary
  • References
  • 11 Anti-forensics
  • Anti-forensic definition and concepts
  • Anti-forensic methods
  • Eliminate trails
  • Hide evidence
  • Destroy evidence
  • Mobile anti-forensics
  • Conclusion
  • References
  • 12 Link and visual analysis
  • Introduction
  • Link and visual analysis
  • Conclusion
  • 13 Psychological, ethical, and cultural implications of digital forensics.
  • Introduction
  • Psychological implications of digital forensics
  • Prospective from the career in law enforcement of Dr. Otting
  • Ethical implications of digital forensics
  • Cultural implications of digital forensics
  • Conclusion
  • References
  • 14 Someone is watching
  • Introduction
  • Case summary
  • Evidence gathering
  • Analysis of evidence
  • Summary
  • 15 The realities of digital forensic practice
  • Introduction
  • The case - taking a look
  • Case #1 - things are not what they seem
  • Case #2 - things are not what they seem
  • Working a criminal case
  • Case #3 - conducting a thorough investigation
  • Case #4 - conducting a thorough investigation
  • Working a civil case
  • Things to keep in mind during any investigation
  • Summary
  • Index.