Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

Front Cover
Albert Marcella, Jr., Robert S. Greenfield
CRC Press, Jan 23, 2002 - Computers - 464 pages
1 Review
Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a comprehensive, highly usable, and clearly organized resource to the issues, tools, and control techniques needed to successfully investigate illegal activities perpetuated through the use of information technology.

Traditional forensics professionals use fingerprints, DNA typing, and ballistics analysis to make their case. Infosec professionals have to develop new tools for collecting, examining, and evaluating data in an effort to establish intent, culpability, motive, means, methods and loss resulting from e-crimes. The field bible for infosecurity professionals, this book introduces you to the broad field of cyber forensics and presents the various tools and techniques designed to maintain control over your organization.

You will understand how to:
  • Identify inappropriate uses of corporate IT
  • Examine computing environments to identify and gather electronic evidence of wrongdoing
  • Secure corporate systems from further misuse
  • Identify individuals responsible for engaging in inappropriate acts taken with or without corporate computing systems
  • Protect and secure electronic evidence from intentional or accidental modification or destruction

    Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes provides a set of varied resources for anyone required to look under the hood and behind closed doors of a virtual world to gather evidence and to establish credible audit trails of electronic wrong doing. Knowing how to identify, gather, document, and preserve evidence of electronic tampering and misuse makes reading this book and using the forensic audit procedures it discusses essential to protecting corporate assets.
  •  

    What people are saying - Write a review

    We haven't found any reviews in the usual places.

    Contents

    Chapter 2 How to Begin a NonLiturgical Forensic Examination
    19
    Tracing Activity on a WindowsBased Desktop
    47
    What is Possible and Where to Look Under the Hood
    79
    Automated Tools Used to Secure a System Throughout the Stages of a Forensic Investigation
    97
    Chapter 6 Network Intrusion Management and Profiling
    117
    Chapter 7 Cyber Forensics and the Legal System
    133
    FEDERAL AND INTERNATIONAL GUIDELINES
    147
    Chapter 8 Searching and Seizing Computers and Obtaining Electronic Evidence
    149
    A Guide for Federal Agencies
    287
    Chapter 15 Encryption
    335
    Chapter 16 Intellectual Property
    361
    FORENSICS TOOLS
    373
    Chapter 17 Forensic and Security Assessment Tools
    375
    Chapter 18 How to Report InternetRelated Crime
    389
    An Auditors Basic Checklist
    391
    IV
    397

    Chapter 9 Computer Crime Policy and Programs
    179
    Chapter 10 International Aspects of Computer Crime
    205
    Chapter 11 Privacy Issues in the HighTech Context
    221
    Chapter 12 Critical Infrstructure Protection
    227
    Legal Issues
    249
    Glossary of Terms
    399
    Recommended Reading List
    415
    Index
    425
    Back cover
    445
    Copyright

    Other editions - View all

    Common terms and phrases

    References to this book

    All Book Search results »

    Bibliographic information