CyberForensics, 2010
Understanding Information Security Investigations

Springer’s Forensic Laboratory Science Series

Coordinator: Bayuk Jennifer

Language: English

Approximative price 116.04 €

In Print (Delivery period: 15 days).

Add to cartAdd to cart
CyberForensics
Publication date:
170 p. · 19.3x26 cm · Paperback

Approximative price 158.24 €

In Print (Delivery period: 15 days).

Add to cartAdd to cart
Cyberforensics. Understanding information security investigations (Springer's forensic laboratory science series, Vol. 0)
Publication date:
170 p. · 19.3x26 cm · Hardback
Cyberforensics is a fairly new word in the technology our industry, but one that n- ertheless has immediately recognizable meaning. Although the word forensics may have its origins in formal debates using evidence, it is now most closely associated with investigation into evidence of crime. As the word cyber has become synonymous with the use of electronic technology, the word cyberforensics bears no mystery. It immediately conveys a serious and concentrated endeavor to identify the evidence of crimes or other attacks committed in cyberspace. Nevertheless, the full implications of the word are less well understood. Cyberforensic activities remain a mystery to most people, even those fully immersed in the design and operation of cyber te- nology. This book sheds light on those activities in a way that is comprehensible not only to technology professionals but also to the technology hobbyist and those simply curious about the ?eld. When I started contributing to the ?eld of cybersecurity, it was an obscure ?eld, rarely mentioned in the mainstream media. According to the FBI, by 2009 organized crime syndicates were making more money via cybercrime than in drug traf?- ing. In spite of the rise in cybercrime and the advance of sophisticated threat actors online, the cyber security profession continues to lag behind in its ability to inves- gate cybercrime and understand the root causes of cyber attacks. In the late 1990s I worked to respond to sophisticated attacks as part of the U. S.
Introduction, by Jennifer Bayuk 1. The Complex World of Corporate Cyber Forensics Investigations, by Greg Leibolt 2. Investigating Large Scale Data Breach Cases, by J. Andrew Valentine 3. Insider Threat Investigations, by Shane Sims 4. Accounting Forensics, by Tracy McBride 5. Analyzing Malicious Software, by Lenny Zeltser 6. Network Security Investigations, by Eddie Schwartz 7. RAM and File Systems Investigations, by Rita Barrios 8. One Picture is Worth a Million Bytes, by Tony Agresta & Don Fergus 9. Cyber Crime and Law Enforcement Cooperation, by Art Ehuan 10. Technology Malpractice, by Paul Rohmeyer

Cutting-edge by innovative researchers

In-depth anaylsis of timely issues in the field

Shows that there is a cohesive set of concepts that binds cybersecurity investigators to a shared vision

Includes supplementary material: sn.pub/extras