Digital Forensics Explained

Digital Forensics Explained

Published:
Content:
Author(s):
Free Standard Shipping

Purchasing Options

Hardback
$79.95
ISBN 9781439874950
Cat# K13476
Add to cart
eBook
ISBN 9781466568938
Cat# KE21230
 

Features

  • Describes the forensic practice from a practitioner's perspective
  • Provides an understanding of the concepts of digital forensics
  • Addresses real-world issues and international considerations
  • Discusses the psychological implications encountered by active forensic investigators

Summary

The field of computer forensics has experienced significant growth recently and those looking to get into the industry have significant opportunity for upward mobility. Focusing on the concepts investigators need to know to conduct a thorough investigation, Digital Forensics Explained provides an overall description of the forensic practice from a practitioner’s perspective.

Starting with an overview, the text describes best practices based on the author’s decades of experience conducting investigations and working in information technology. It illustrates the forensic process, explains what it takes to be an investigator, and highlights emerging trends. Filled with helpful templates and contributions from seasoned experts in their respective fields, the book includes coverage of:

  • Internet and email investigations
  • Mobile forensics for cell phones, iPads, music players, and other small devices
  • Cloud computing from an architecture perspective and its impact on digital forensics
  • Anti-forensic techniques that may be employed to make a forensic exam more difficult to conduct
  • Recoverability of information from damaged media
  • The progression of a criminal case from start to finish
  • Tools that are often used in an examination, including commercial, free, and open-source tools; computer and mobile tools; and things as simple as extension cords
  • Social media and social engineering forensics
  • Case documentation and presentation, including sample summary reports and a cover sheet for a cell phone investigation

The text includes acquisition forms, a sequential process outline to guide your investigation, and a checklist of supplies you’ll need when responding to an incident. Providing you with the understanding and the tools to deal with suspects who find ways to make their digital activities hard to trace, the book also considers cultural implications, ethics, and the psychological effects that digital forensics investigations can have on investigators.

Table of Contents

What Is Digital Forensics and What Should You Know about It?
Introduction
Forensic Science
     What Does It Take to Be a Digital Forensic Investigator?
Educational Opportunities 
     What Opportunities Are There for Digital Forensic Investigators? 
     What Are the Trends and Challenges in Digital Forensics? 
     Resources Available to Digital Forensic Investigators
Conclusion
References

Digital Forensic Approaches and Best Practices
Introduction
First Response
Responding to a Case
Conclusion
References
Other Useful References

Digital Forensics Tool Kit
Introduction
Computer Forensics
Write Blockers
Imaging
Add-Ons and Other Technologies
Tools
Mobile Forensics Tools
Visual Analysis
Secured Storage
Damaged Media
Summary

Internet and E-Mail Examinations
Introduction
E-mail
Chat and Messaging Logs
Peer to Peer
Search Engine Activity
Internet History
Social Networking and Gaming
Malware and Viruses
Summary

Mobile Forensics
Introduction
Mobile Phone Technology
How a Call Is Made
Forensic Challenges
Forensic Process
Digital Cell Phone Investigation
Geographic Positioning Systems
Cameras
Summary
Cellular Communications Technology Overview
References

Cloud Computing and Digital Forensics, Prof. Gerald Emerick
Introduction
Infrastructure as a Service
Platform as a Service
Software as a Service
Service and Deployment Models
Customer versus Cloud Provider Responsibilities
Other Service Models
Multi-Tenancy
User Access and Provisioning
Data Protection and Breaches
Information Technology and Information Security Governance and Change Control Processes
Service Access Vulnerabilities
Migration Planning
Incident Response
Virtualization
Security Benefits of Cloud

Incident Response,
Det . Jason Otting
Introduction
Case Summary
The Initiation of an Investigation
Information
Evidence Gathering
Interviews and the Analyzing of Evidence
Analyzing the Electronic Evidence
Prosecution and Testimony
Things to Consider
Conclusion

Report Writing and Presentation
Introduction
Report Content and Considerations
Sample Reports
Presenting and Testifying
Archiving
Summary

Social Media Forensics, Dr. Barbara L. Ciaramitaro
Introduction to Social Media 
     Social Networking 
     E-mail 
     Blogs 
     Microblogs 
     Event Coordination 
     Location Identification 
     Multimedia Sharing
     Search 
     Wikis 
     Web Conferencing 
     Virtual Worlds
Social Media Forensics 
     Street Gangs 
     Terrorist Activity 
     White Collar Crimes
Summary
References

Social Engineering Forensics, Dr. Barbara L. Ciaramitaro
Introduction to Social Engineering
     Online Social Engineering Attacks
     Telephone Social Engineering Attacks 
     Waste Management Social Engineering Attacks 
     Mobile Device Social Engineering Attacks
     Personal Social Engineering Attacks
     Reverse Social Engineering Attacks
Social Engineering Forensics 
Social Engineering Attack Vector Vulnerabilities
Conclusion
References

Anti –Forensics, Prof. Velislav Pavlov
Anti-Forensic Definition and Concepts
Anti-Forensic Methods 
     Eliminate Trails 
     Hide Evidence 
     Destroy Evidence
Mobile Anti-Forensics
Conclusion
References

Link and Visual Analysis
Introduction
Link and Visual Analysis
Conclusion

Psychological, Ethical, and Cultural Implications of Digital Forensics
Introduction
Psychological Implications of Digital Forensics
Ethical Implications of Digital Forensics
Cultural Implications
Conclusion
References

Index

Author Bio(s)

Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press
Sign Up for Email Alerts
© 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us