Digital Forensics Explained [2 ed.] 9780367502812, 9781000350708, 9780367503437, 9781003049357

Digital Forensics Explained, 2nd edition, covers the full life cycle of conducting a mobile and computer digital forensi

165 90 8MB

English Pages 324 Year 2021

Report DMCA / Copyright

DOWNLOAD FILE

Digital Forensics Explained [2 ed.]
 9780367502812, 9781000350708, 9780367503437, 9781003049357

Table of contents :
Cover
Half Title
Title Page
Copyright Page
Table of Contents
Preface
Acknowledgments
Author
Contributors
1 What is digital forensics, and what should you know about it?
Introduction
Forensic science
What does it take to be a digital forensic investigator?
Educational opportunities
What opportunities are there for digital forensic investigators?
What are the trends and challenges in digital forensics?
Resources available to digital forensic investigators
Conclusion
References
2 Digital forensic approaches and best practices
Introduction
First response
Responding to a case
Conclusion
References
Other useful resources
3 Digital forensics tool kit
Introduction
Computer forensics
Write blockers
Imaging
Add-ons and other technologies
Tools
Mobile forensics tools
Visual analysis
Secured storage
Damaged media
Summary
References
4 Internet and e-mail examinations
Introduction
E-mail
Chat and messaging logs
Peer-to-peer
Search engine activity
Internet history
Social networking and gaming
Malware and viruses
Summary
5 Mobile forensics
Introduction
Mobile phone technology
How a call is made
Forensic challenges
Forensic process
Digital cell phone investigation
Geographic positioning systems
Cameras
Common extraction types
Information sources and location information
Summary
Cellular communications technology overview
References
6 Cloud computing and digital forensics
Introduction
Infrastructure as a service
Platform as a service
Software as a service
Service and deployment models
Customer versus cloud provider responsibilities
Other service models
Multi-tenancy
User access and provisioning
Data protection and breaches
Information technology and information security governance and change control processes
Service access vulnerabilities
Migration planning
Incident response
Virtualization
Security benefits of cloud
7 Law enforcement incident response
Introduction
Case summary
The initiation of an investigation
Information
Evidence gathering
Interviews and the analysis of evidence
Analysis of the electronic evidence
Prosecution and testimony
Things to consider
Conclusion
8 Report writing and presentation
Introduction
Report content and considerations
Sample reports
Presenting and testifying
Dr. Otting’s thoughts on criminal case testimony
Archiving
Summary
9 Social media forensics
Introduction
Introduction to social media
Social networking
Micro blogs
Multimedia sharing
Instant messaging and communication
Blogs
Event coordination
Location identification
Search
Wikis
Web conferencing
Virtual worlds
Social media forensics
Street gangs
Terrorist activity
White collar crimes
Summary
References
10 Social engineering forensics
Introduction
Introduction to social engineering
Online social engineering attacks
Telephone social engineering attacks
Waste management social engineering attacks
Mobile device social engineering attacks
Personal social engineering attacks
Reverse social engineering attacks
Social engineering forensics
Summary
References
11 Anti-forensics
Anti-forensic definition and concepts
Anti-forensic methods
Eliminate trails
Hide evidence
Destroy evidence
Mobile anti-forensics
Conclusion
References
12 Link and visual analysis
Introduction
Link and visual analysis
Conclusion
13 Psychological, ethical, and cultural implications of digital forensics
Introduction
Psychological implications of digital forensics
Prospective from the career in law enforcement of Dr. Otting
Ethical implications of digital forensics
Cultural implications of digital forensics
Conclusion
References
14 Someone is watching
Introduction
Case summary
Evidence gathering
Analysis of evidence
Summary
15 The realities of digital forensic practice
Introduction
The case – taking a look
Case #1 – things are not what they seem
Case #2 – things are not what they seem
Working a criminal case
Case #3 – conducting a thorough investigation
Case #4 – conducting a thorough investigation
Working a civil case
Things to keep in mind during any investigation
Summary
Index

Polecaj historie