CyberForensics: Understanding Information Security Investigations

Front Cover
Jennifer Bayuk
Springer Science & Business Media, Sep 10, 2010 - Medical - 170 pages
Cyberforensics is a fairly new word in the technology our industry, but one that n- ertheless has immediately recognizable meaning. Although the word forensics may have its origins in formal debates using evidence, it is now most closely associated with investigation into evidence of crime. As the word cyber has become synonymous with the use of electronic technology, the word cyberforensics bears no mystery. It immediately conveys a serious and concentrated endeavor to identify the evidence of crimes or other attacks committed in cyberspace. Nevertheless, the full implications of the word are less well understood. Cyberforensic activities remain a mystery to most people, even those fully immersed in the design and operation of cyber te- nology. This book sheds light on those activities in a way that is comprehensible not only to technology professionals but also to the technology hobbyist and those simply curious about the ?eld. When I started contributing to the ?eld of cybersecurity, it was an obscure ?eld, rarely mentioned in the mainstream media. According to the FBI, by 2009 organized crime syndicates were making more money via cybercrime than in drug traf?- ing. In spite of the rise in cybercrime and the advance of sophisticated threat actors online, the cyber security profession continues to lag behind in its ability to inves- gate cybercrime and understand the root causes of cyber attacks. In the late 1990s I worked to respond to sophisticated attacks as part of the U. S.

What people are saying - Write a review

We haven't found any reviews in the usual places.


Chaptet 1 Introduction
Chaptet 2 The Complex World of Corporate CyberForensics Investigations
Chaptet 3 Investigating LargeScale Data Breach Cases
Chaptet 4 Insider Threat Investigations
Chaptet 5 Accounting Forensics
Chaptet 6 Analyzing Malicious Software
Chaptet 7 Network Packet Forensics
Chaptet 8 RAM and File Systems Investigations
Chaptet 9 One Picture is Worth a Million Bytes
Chaptet 10 Cybercrime and Law Enforcement Cooperation
Chaptet 11 Technology Malpractice

Other editions - View all

Common terms and phrases

Bibliographic information