|
" Investigating Computer-Related Crime. "
Peter Stephenson
Document Type
|
:
|
BL
|
Record Number
|
:
|
750008
|
Doc. No
|
:
|
b569967
|
Main Entry
|
:
|
Peter Stephenson
|
Title & Author
|
:
|
Investigating Computer-Related Crime.\ Peter Stephenson
|
Edition Statement
|
:
|
2nd ed
|
Publication Statement
|
:
|
Hoboken : CRC Press, 2013
|
Page. NO
|
:
|
(387 pages)
|
ISBN
|
:
|
1420003704
|
|
:
|
: 9781420003703
|
Notes
|
:
|
Written by an information security specialist, this second edition of Investigating Computer-Related Crime discusses cybercrime, its investigation, and the difficulties encountered by both public law enforcement officials and private corporate investigators. The book offers insights into collecting evidence, interrogating suspects and witnesses, handling crime in progress, as well as issues involving the authorities, and helpful case studies. Updated chapters incorporate new kinds of attacks, current work of the Digital Forensic Research Workshop and their investigative model, new operating sy.
|
Contents
|
:
|
Front Cover --; Contents --; Introduction --; About the Authors --; Chapter 1 --; Cybercrime as We Enter the Twenty-First Century --; Chapter 2 --; The Potential Impacts of Cybercrime --; Chapter 3 --; Malware Attacks --; Chapter 4 --; Surgical Strikes and Shotgun Blasts --; Chapter 5 --; A Framework for Conducting an Investigation of a Computer Security Incident --; Chapter 6 --; Look for the Hidden Flaw --; Chapter 7 --; Analyzing the Remnants of a Computer Security Incident --; Chapter 8 --; Launching the Investigation --; Chapter 9 --; Determining If a Crime Has Taken Place --; Chapter 10 --; Cover-Ups Are Common --; Chapter 11 --; Involving the Authorities --; Chapter 12 --; When an Investigation Cannot Continue --; Chapter 13 --; Building a Corporate Cyber "SWAT Team" --; Chapter 14 --; Privacy and Computer Crime --; Chapter 15 --; Introduction to End-to-End Digital Investigation --; Chapter 16 --; Collecting and Analyzing Evidence of a Computer Crime --; Chapter 17 --; Using Evidence Effectively --; Chapter 18 --; Conducting Incident Postmortems --; Appendix A --; Appendix B --; Appendix C --; Back Cover.
|
Abstract
|
:
|
Since the last edition of this book was written more than a decade ago, cybercrime has evolved. Motives have not changed, but new means and opportunities have arisen with the advancement of the digital age. Investigating Computer-Related Crime: Second Edition incorporates the results of research and practice in a variety of venues, growth in the field, and new technology to offer a fresh look at the topic of digital investigation. Following an introduction to cybercrime and its impact on society, this book examines: Malware and the important differences between targeted attacks and general attacks The framework for conducting a digital investigation, how it is conducted, and some of the key issues that arise over the course of an investigation How the computer forensic process fits into an investigation The concept of system glitches vs. cybercrime and the importance of weeding out incidents that don't need investigating Investigative politics that occur during the course of an investigation, whether to involve law enforcement, and when an investigation should be stopped How to prepare for cybercrime before it happens End-to-end digital investigation Evidence collection, preservation, management, and effective use How to critique your investigation and maximize lessons learned This edition reflects a heightened focus on cyber stalking and cybercrime scene assessment, updates the tools used by digital forensic examiners, and places increased emphases on following the cyber trail and the concept of end-to-end digital investigation. Discussion questions at the end of each chapter are designed to stimulate further debate into this fascinating field.
|
Subject
|
:
|
Computer crimes -- Investigation.
|
LC Classification
|
:
|
HV6773.2P484 2013
|
Added Entry
|
:
|
Peter Stephenson
|
| |