رکورد قبلیرکورد بعدی

" Placing the suspect behind the keyboard : "


Document Type : BL
Record Number : 591753
Doc. No : b420972
Main Entry : Shavers, Brett.
Title & Author : Placing the suspect behind the keyboard : : using digital forensics and investigative techniques to identify cybercrime suspects /\ Brett Shavers, Harlan Carvey, Technical Editor.
Page. NO : xxii, 267 pages :: illustrations ;; 25 cm
ISBN : 9781597499859 (alk. paper)
: : 1597499854 (alk. paper)
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Machine generated contents note: ch. 1 Introduction -- Digital Evidence Collection -- Simple File Copying -- "Dead Box" Approaches -- "Live Box" Approaches -- Decision-Making FlowChart -- Preview/Triage -- SmartPhones and Cellular Devices -- GPS -- Summary -- Bibliography -- ch. 2 High Tech Interview -- Introduction -- The Main Goal of Questioning a Suspect -- The Line of Questions for Suspects -- Computer Skills, Ability, and Knowledge -- Password, Encryption, Steganography, and Deletion -- Control of the Device(s) in Question -- Other Devices Used by Suspect -- Software Used by Suspect -- Internet Use by Suspect -- Online Chat, Email, Forums, Boards, Online Social Networking -- Peer-to-Peer Networking -- File Storage -- Crime Specific -- Child Pornography -- Crime Specific -- Identity Theft -- Other Alleged Crimes -- Questions for Victims -- Computer Crime Victim Questions -- Identity Theft -- Computer Crime Victim Questions -- Harassment Via Email/Text/Online Postings -- Questions for Network Administrators -- Customer Accounts -- Internet Service Provider, Online Data Hosting, Other Online Services -- Summary -- Bibliography -- ch. 3 Physical Investigations -- Introduction -- Hazards of Acting Upon Minimal Information -- Physical Surveillance -- Mobile Surveillance -- Aerial Surveillance -- Video Surveillance -- Covertly Installed Cameras -- Other Sources of Surveillance Records -- Surveillance Notes and Timelines -- Electronic Surveillance -- Oral Intercepts -- Dialed Number Recorders -- Trash Runs -- Tracking Cell Phones -- Vehicle Tracking -- Keystroke Logging -- Consumer Purchase Records -- Obtaining Personal Information -- Undercover and Informant Operations -- Witnesses -- Neighbors as Surveillance Agents -- Deconfliction -- Summary -- Bibliography -- Further Reading -- ch. 4 Technical Investigations -- Introduction -- Digital Investigative Techniques -- What is a Person? -- Who? What? When? Why? Where? And How? -- Location -- Time -- Wireless Connections -- Network (Cloud) Connections -- Photos and Videos -- Internet Evidence (Mobile Devices, Computers, and Game Systems) -- Texts and Emails -- Calendar Evidence -- "Other" Device Forensics -- Online Social Networking -- User Activity -- User logins -- User-Specific Computer Activity -- Digital Authorship -- Profiling -- Biological Forensic Evidence -- Triage and Previews -- Summary -- Bibliography -- Further Reading -- ch. 5 Putting It All Together -- "2+2 = Putting It All Together" -- The Evidence as a Whole -- Avoiding Assumptions -- Who Did It? -- Timelines -- Follow the Evidence -- Computer User Activity -- Rabbit Holes -- Summary -- Bibliography -- ch. 6 Investigative Case Management -- Introduction -- Basic Case Tracking -- The Case Name -- Note Taking -- Analyzing Your Notes -- Analysis with Spreadsheets -- Analysis with Databases -- Analysis Using Charts -- Analysis Using Maps -- Fresh Set of Eyes -- Summary -- Bibliography -- ch. 7 Case Presentation -- Introduction -- It's Not Whether You Win or Lose -- Investigative Mindset -- Your Audience -- Preparation -- Organizing Case Information -- Value of Visuals -- Presentation Media -- Slideshows and Animations -- Charts and Diagrams -- The Suspect's Machine -- Analogies -- Avoid TMI (Too Much Information) -- Your Presentation -- Summary -- Bibliography -- ch. 8 Cheat Sheets and Quickstart Guides -- Introduction -- Cheat Sheets and Quickstart Guides -- Turnover Folders -- Visual Aids -- Investigative Aids -- Study Guides -- Make Your Own -- Checklists -- Summary -- Bibliography -- ch. 9 Some Things Will Become Easier, Others Not So Much -- Introduction -- It Will Become Easier to Place a Suspect Behind the Keyboard -- Operating Systems Will Make It Easier -- Computer Hardware and Software Applications Will Make It Easier -- New and Innovative Computing Devices Will Make It Easier -- Data Storage and Access Will Make It Easier -- Public Awareness and Education Will Make It Easier -- The Suspect Will Make It Easier -- Pre-Placed Surveillance Systems Will Make It Easier -- New Laws and Employer Rights Will Make It Easier -- It Will Become More Difficult to Place a Suspect Behind the Keyboard -- Encryption Will Make It More Difficult -- Public awareness Will Make It More Difficult -- Remote Control of Systems Will Make It More Difficult -- Open Wi-Fi Hotspots Will Make It More Difficult -- Massive and Duplicate Data Will Make It More Difficult -- Virtual Machines Will Make It More Difficult -- Even More Techniques Will Make It Difficult -- Summary -- Bibliography -- ch. 10 Online Investigations -- Introduction -- Online Investigations -- Why the Internet? -- What Can Be Found Online? -- How to Build Your "Super" Browser -- Internet Search Engines and Directories -- Usernames -- Social Networking Websites -- Blogs, Forums, and Wikis -- The Dark Web -- Following the Bread Crumbs -- Capturing Webpages as Evidence -- Be Careful of Your Visits Online -- Summary -- Bibliography -- ch. 11 Case Studies -- Introduction -- A Day in the Life of a Cybercriminal -- Backdating Documents -- False Names and Disposable Email Accounts -- Evidence Leads to More Evidence -- Searching for All the Bad Things -- Scenario -- Threatening Blog Posts -- Making the Wrong Kind of Friends Online -- A Break in the Case, Otherwise Known as a Suspect's Mistake -- Altered Evidence and Spoliation -- Spoofed Call Harassment -- Disgruntled Employee Steals and Deletes Employer's Data -- Missing Evidence -- Bomb Threats by Email -- ID the Suspect -- Online Extortion -- Placing Suspect at a Location -- Placing the Suspect in the Office at a Specific Location -- Stolen Property -- IP Addresses Aren't Enough -- Planted Evidence -- The Life and Casework of a Cyber Investigator -- Technical Knowledge and Skills -- This Case is Different from That Case -- Testifying to Your Work -- Summary -- Bibliography.
Subject : Computer crimes-- Investigation.
Subject : Electronic evidence.
Subject : Criminal procedure.
Subject : Criminal investigation.
Dewey Classification : ‭363.25/968‬
LC Classification : ‭HV8079.C65‬‭S437 2013‬
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟