Description
CyberForensics, 2010
Understanding Information Security Investigations
Springer’s Forensic Laboratory Science Series
Coordinator: Bayuk Jennifer
Language: English
CyberForensics
Publication date: 11-2012
170 p. · 19.3x26 cm · Paperback
Publication date: 11-2012
170 p. · 19.3x26 cm · Paperback
Cyberforensics. Understanding information security investigations (Springer's forensic laboratory science series, Vol. 0)
Publication date: 09-2010
170 p. · 19.3x26 cm · Hardback
Publication date: 09-2010
170 p. · 19.3x26 cm · Hardback
Description
/li>Contents
/li>Comment
/li>
Cyberforensics is a fairly new word in the technology our industry, but one that n- ertheless has immediately recognizable meaning. Although the word forensics may have its origins in formal debates using evidence, it is now most closely associated with investigation into evidence of crime. As the word cyber has become synonymous with the use of electronic technology, the word cyberforensics bears no mystery. It immediately conveys a serious and concentrated endeavor to identify the evidence of crimes or other attacks committed in cyberspace. Nevertheless, the full implications of the word are less well understood. Cyberforensic activities remain a mystery to most people, even those fully immersed in the design and operation of cyber te- nology. This book sheds light on those activities in a way that is comprehensible not only to technology professionals but also to the technology hobbyist and those simply curious about the ?eld. When I started contributing to the ?eld of cybersecurity, it was an obscure ?eld, rarely mentioned in the mainstream media. According to the FBI, by 2009 organized crime syndicates were making more money via cybercrime than in drug traf?- ing. In spite of the rise in cybercrime and the advance of sophisticated threat actors online, the cyber security profession continues to lag behind in its ability to inves- gate cybercrime and understand the root causes of cyber attacks. In the late 1990s I worked to respond to sophisticated attacks as part of the U. S.
Introduction, by Jennifer Bayuk 1. The Complex World of Corporate Cyber Forensics Investigations, by Greg Leibolt 2. Investigating Large Scale Data Breach Cases, by J. Andrew Valentine 3. Insider Threat Investigations, by Shane Sims 4. Accounting Forensics, by Tracy McBride 5. Analyzing Malicious Software, by Lenny Zeltser 6. Network Security Investigations, by Eddie Schwartz 7. RAM and File Systems Investigations, by Rita Barrios 8. One Picture is Worth a Million Bytes, by Tony Agresta & Don Fergus 9. Cyber Crime and Law Enforcement Cooperation, by Art Ehuan 10. Technology Malpractice, by Paul Rohmeyer
Cutting-edge by innovative researchers
In-depth anaylsis of timely issues in the field
Shows that there is a cohesive set of concepts that binds cybersecurity investigators to a shared vision
Includes supplementary material: sn.pub/extras
© 2024 LAVOISIER S.A.S.