CyberForensics: Understanding Information Security Investigations

Front Cover
Jennifer Bayuk
Springer Science & Business Media, Sep 10, 2010 - Medical - 170 pages
Cyberforensics is a fairly new word in the technology our industry, but one that n- ertheless has immediately recognizable meaning. Although the word forensics may have its origins in formal debates using evidence, it is now most closely associated with investigation into evidence of crime. As the word cyber has become synonymous with the use of electronic technology, the word cyberforensics bears no mystery. It immediately conveys a serious and concentrated endeavor to identify the evidence of crimes or other attacks committed in cyberspace. Nevertheless, the full implications of the word are less well understood. Cyberforensic activities remain a mystery to most people, even those fully immersed in the design and operation of cyber te- nology. This book sheds light on those activities in a way that is comprehensible not only to technology professionals but also to the technology hobbyist and those simply curious about the ?eld. When I started contributing to the ?eld of cybersecurity, it was an obscure ?eld, rarely mentioned in the mainstream media. According to the FBI, by 2009 organized crime syndicates were making more money via cybercrime than in drug traf?- ing. In spite of the rise in cybercrime and the advance of sophisticated threat actors online, the cyber security profession continues to lag behind in its ability to inves- gate cybercrime and understand the root causes of cyber attacks. In the late 1990s I worked to respond to sophisticated attacks as part of the U. S.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Chaptet 1 Introduction
1
Chaptet 2 The Complex World of Corporate CyberForensics Investigations
7
Chaptet 3 Investigating LargeScale Data Breach Cases
29
Chaptet 4 Insider Threat Investigations
45
Chaptet 5 Accounting Forensics
53
Chaptet 6 Analyzing Malicious Software
59
Chaptet 7 Network Packet Forensics
85
Chaptet 8 RAM and File Systems Investigations
103
Chaptet 9 One Picture is Worth a Million Bytes
117
Chaptet 10 Cybercrime and Law Enforcement Cooperation
129
Chaptet 11 Technology Malpractice
141
Glossary
149
Index
153
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information