Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Elsevier, Apr 18, 2011 - Computers - 432 pages
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.
The book begins with the chapter “What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only will these topics be generally be discussed and explained for the novice, but the hard questions —the questions that have the power to divide this community— will also be examined in a comprehensive and thoughtful manner.
This book will serve as a foundational text for the cyber crime community to begin to move past current difficulties into its next evolution.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
able allow analysis attack attorney authentication best practices BestCrypt cell phone chapter child pornography ChoicePoint communications computer crime computer forensics contract corporate counsel court create crime scene criminal cyber crime investigator data objects database defense definition digital evidence digital forensics discussed disk documents e-mail electronic employees encryption ESM manager example federal Figure files Frequently Asked Questions hard drive hardware hash HIPAA information security information security consultants Internet involved IP address issues law enforcement liability MAC address malware officer on-scene operating system options organization parties physical policies potential Prevent Cyber Crime preview software prosecutor protect puter responder security evaluation seized seizure server SMTP Solutions Fast Track specific spyware standard storage device suspect technical terabyte testify tion types understand VoIP warrant WiFi
Page 31 - As used in this section— (1) the term "computer" means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device...