| |
| |
Preface | |
| |
| |
Acknowledgments | |
| |
| |
Authors | |
| |
| |
Contributors | |
| |
| |
| |
What is Digital Forensics, and What Should You Know About It? | |
| |
| |
Introduction | |
| |
| |
Forensic Science | |
| |
| |
What Does It Take to Be a Digital Forensic Investigator? | |
| |
| |
Education Opportunities | |
| |
| |
What Opportunities Are There for Digital Forensic Investigators? | |
| |
| |
What Are the Trends and Challenges in Digital Forensics? | |
| |
| |
Resources Available to Digital Forensic Investigators | |
| |
| |
Conclusion | |
| |
| |
References | |
| |
| |
| |
Digital Forensic Approaches and Best Practices | |
| |
| |
Introduction | |
| |
| |
First Response | |
| |
| |
Responding to a Case | |
| |
| |
Conclusion | |
| |
| |
References | |
| |
| |
Other Useful Resources | |
| |
| |
| |
Digital Forensics Tool Kit | |
| |
| |
Introduction | |
| |
| |
Computer Forensics | |
| |
| |
Write Blockers | |
| |
| |
Imaging | |
| |
| |
Add-Ons and Other Technologies | |
| |
| |
Tools | |
| |
| |
Mobile Forensics Tools | |
| |
| |
Visual Analysis | |
| |
| |
Secured Storage | |
| |
| |
Damaged Media | |
| |
| |
Summary | |
| |
| |
| |
Internet and E-Mail Examinations | |
| |
| |
Introduction | |
| |
| |
E-Mail | |
| |
| |
Chat and Messaging Logs | |
| |
| |
Peer-to-Peer | |
| |
| |
Search Engine Activity | |
| |
| |
Internet History | |
| |
| |
Social Networking and Gaming | |
| |
| |
Malware and Viruses | |
| |
| |
Summary | |
| |
| |
| |
Mobile Forensics | |
| |
| |
Introduction | |
| |
| |
Mobile Phone Technology | |
| |
| |
How a Call Is Made | |
| |
| |
Forensic Challenges | |
| |
| |
Forensic Process | |
| |
| |
Digital Cell Phone Investigation | |
| |
| |
Geographic Positioning Systems | |
| |
| |
Cameras | |
| |
| |
Summary | |
| |
| |
Cellular Communications Technology Overview | |
| |
| |
References | |
| |
| |
| |
Cloud Computing and Digital Forensics | |
| |
| |
| |
Introduction | |
| |
| |
Infrastructure as a Service | |
| |
| |
Platform as a Service | |
| |
| |
Software as a Service | |
| |
| |
Service and Deployment Models | |
| |
| |
Customer versus Cloud Provider Responsibilities | |
| |
| |
Other Service Models | |
| |
| |
Multi-Tenancy | |
| |
| |
User Access and Provisioning | |
| |
| |
Data Protection and Breaches | |
| |
| |
Information Technology and Information Security Governance and Change Control Processes | |
| |
| |
Service Access Vulnerabilities | |
| |
| |
Migration Planning | |
| |
| |
Incident Response | |
| |
| |
Virtualization | |
| |
| |
Security Benefits of Cloud | |
| |
| |
| |
Incident Response | |
| |
| |
| |
Introduction | |
| |
| |
Case Summary | |
| |
| |
The Initiation of an Investigation | |
| |
| |
Information | |
| |
| |
Evidence Gathering | |
| |
| |
Interviews and the Analysis of Evidence | |
| |
| |
Analysis of the Electronic Evidence | |
| |
| |
Prosecution and Testimony | |
| |
| |
Things to Consider | |
| |
| |
Conclusion | |
| |
| |
| |
Report Writing and Presentation | |
| |
| |
Introduction | |
| |
| |
Report Content and Considerations | |
| |
| |
Sample Reports | |
| |
| |
Presenting and Testifying | |
| |
| |
Archiving | |
| |
| |
Summary | |
| |
| |
| |
Social Media Forensics | |
| |
| |
| |
Introduction to Social Media | |
| |
| |
Social Networking | |
| |
| |
E-Mail | |
| |
| |
Blogs | |
| |
| |
Microblogs | |
| |
| |
Event Coordination | |
| |
| |
Location Identification | |
| |
| |
Multimedia Sharing | |
| |
| |
Search | |
| |
| |
Wikis | |
| |
| |
Web Conferencing | |
| |
| |
Virtual Worlds | |
| |
| |
Social Media Forensics | |
| |
| |
Street Gangs | |
| |
| |
Terrorist Activity | |
| |
| |
White Collar Crimes | |
| |
| |
Summary | |
| |
| |
References | |
| |
| |
| |
Social Engineering Forensics | |
| |
| |
| |
Introduction to Social Engineering | |
| |
| |
Online Social Engineering Attacks | |
| |
| |
Telephone Social Engineering Attacks | |
| |
| |
Waste Management Social Engineering Attacks | |
| |
| |
Mobile Device Social Engineering Attacks | |
| |
| |
Personal Social Engineering Attacks | |
| |
| |
Reverse Social Engineering Attacks | |
| |
| |
Social Engineering Forensics | |
| |
| |
Social Engineering Attack Vector Vulnerabilities | |
| |
| |
Conclusion | |
| |
| |
References | |
| |
| |
| |
Anti-Forensics | |
| |
| |
| |
Anti-Forensic Definition and Concepts | |
| |
| |
Anti-Forensic Methods | |
| |
| |
Eliminate Trails | |
| |
| |
Hide Evidence | |
| |
| |
Destroy Evidence | |
| |
| |
Mobile Anti-Forensics | |
| |
| |
Conclusion | |
| |
| |
References | |
| |
| |
| |
Link and Visual Analysis | |
| |
| |
Introduction | |
| |
| |
Link and Visual Analysis | |
| |
| |
Conclusion | |
| |
| |
| |
Psychological, Ethical, and Cultural Implications of Digital Forensics | |
| |
| |
Introduction | |
| |
| |
Psychological Implications of Digital Forensics | |
| |
| |
Ethical Implications of Digital Forensics | |
| |
| |
Cultural Implications of Digital Forensics | |
| |
| |
Conclusion | |
| |
| |
References | |
| |
| |
Index | |