| |
| |
Security Series Walk-Through | |
| |
| |
Preface | |
| |
| |
About the Authors | |
| |
| |
Acknowledgments | |
| |
| |
Quality Assurance | |
| |
| |
| |
Admissibility of Electronic Evidence | |
| |
| |
| |
Forensic Evidence and Crime Investigation | |
| |
| |
Basics of Crimes | |
| |
| |
Information Warfare, Electronic Attack, and Terrorism | |
| |
| |
Computer Forensics Evidence and Investigations | |
| |
| |
Electronic Evidence: Technology and Legal Issues | |
| |
| |
Computer Forensics: A Growing Field and Practice Area | |
| |
| |
Discovery | |
| |
| |
Electronic Discovery (E-Discovery) | |
| |
| |
Summary | |
| |
| |
Test Your Skills | |
| |
| |
| |
Computer Forensics and Digital Detective Work | |
| |
| |
The Role of E-Evidence in Solving Physical and Computer Crimes | |
| |
| |
Computer Forensics Science | |
| |
| |
Digital Signatures and Profiling | |
| |
| |
Computer Forensics and the E-Evidence Collection Process | |
| |
| |
Suppression, Probable Cause, and Search Warrants | |
| |
| |
Types of Motives and Cybercrimes | |
| |
| |
Forensics Rules and Evidence Issues | |
| |
| |
Computer Forensics Investigator's Responsibilities | |
| |
| |
Summary | |
| |
| |
Test Your Skills | |
| |
| |
| |
Preparing for E-Evidence Collection and Preservation | |
| |
| |
| |
Tools, Environments, Equipment, and Certifications | |
| |
| |
Managing the Life-Cycle of a Case | |
| |
| |
Acquiring and Authenticating the E-Evidence | |
| |
| |
Searching and Analyzing the Data | |
| |
| |
Investigative Environments and Analysis Modes | |
| |
| |
Forensic Tools and Toolkits | |
| |
| |
Forensics Equipment | |
| |
| |
Certification and Training Programs | |
| |
| |
Summary | |
| |
| |
Test Your Skills | |
| |
| |
| |
Policies and Procedures | |
| |
| |
Reasons for Policies and Procedures | |
| |
| |
Precase Preparations | |
| |
| |
Steps in the Forensic Examination | |
| |
| |
Examining the Evidence | |
| |
| |
The Art of Forensics: Analyzing the Data | |
| |
| |
Reporting on the Investigation | |
| |
| |
Summary | |
| |
| |
Test Your Skills | |
| |
| |
| |
Data, PDA, and Cell Phone Forensics | |
| |
| |
Basic Hard Drive Technology | |
| |
| |
Other Storage Technologies | |
| |
| |
Personal Digital Assistant Devices (PDAs) | |
| |
| |
Cellular Phones | |
| |
| |
Drive and Media Analysis | |
| |
| |
PDA Analysis | |
| |
| |
Cellular Phone Analysis | |
| |
| |
Disk Image Forensic Tools | |
| |
| |
PDA/Cellular Phone Forensic Software | |
| |
| |
Summary | |
| |
| |
Test Your Skills | |
| |
| |
| |
Forensic Examination of Computers and Digital and Electronic Media | |
| |
| |
| |
Operating Systems and Data Transmission Basics for Digital Investigations | |
| |
| |
What Is an Operating System? | |
| |
| |
Major Components of an Operating System | |
| |
| |
Common Operating Systems | |
| |
| |
Common File System Types | |
| |
| |
OSI and TCP/IP Models | |
| |
| |
Summary | |
| |
| |
Test Your Skills | |
| |
| |
| |
Investigating Windows, Linux, and Graphics Files | |
| |
| |
Investigating Windows Systems | |
| |
| |
Finding User Data and Profiles in Windows Folders | |
| |
| |
Investigating System Artifacts | |
| |
| |
Investigating Linux Systems | |
| |
| |
Graphic File Forensics | |
| |
| |
Summary | |
| |
| |
Test Your Skills | |
| |
| |
| |
E-Mail and Webmail Forensics | |
| |
| |
Importance of E-Mail as Evidence | |
| |
| |
Working with E-Mail | |
| |
| |
Working with Webmail | |
| |
| |
Working with Mail Servers | |
| |
| |
Examining E-Mails for Evidence | |
| |
| |
Working with Instant Messaging | |
| |
| |
Summary | |
| |
| |
Test Your Skills | |
| |
| |
| |
Detecting Intrusions, Malware, and Fraud | |
| |
| |
| |
Internet and Network Forensics and Intrusion Detection | |
| |
| |
An Introduction to Network Forensics and Intrusion Detection | |
| |
| |
Data Sources on a Network | |
| |
| |
Physical Aspects of Capturing Data | |
| |
| |
Logical Aspects of Capturing Data | |
| |
| |
Examining Data | |
| |
| |
NFAT Software Tools | |
| |
| |
Summary | |
| |
| |
Test Your Skills | |
| |
| |
| |
Tracking Down Those Who Intend to Do Harm on a Large Scale | |
| |
| |
Large-Scale Investigations | |
| |
| |
Terrorism, Virtual Warfare, and Other Types of Internet-Based Hostilities | |
| |
| |
Botnets and Criminal Commerce | |
| |
| |
Tracking Criminals' Trails | |
| |
| |
Summary | |
| |
| |
Test Your Skills | |
| |
| |
| |
Fraud and Forensic Accounting Investigation | |
| |
| |
Challenges of Fraud Investigations | |
| |
| |
Types of Fraud | |
| |
| |
Characteristics and Symptoms of Fraud | |
| |
| |
Fraud Investigation and Deterrence | |
| |
| |
Digital Forensic Accounting | |
| |
| |
Summary | |
| |
| |
Test Your Skills | |
| |
| |
| |
Legal, Ethical, and Testimony Topics | |
| |
| |
| |
Federal Rules and Criminal Codes | |
| |
| |
Due Process of the Law | |
| |
| |
Anticrime Laws | |
| |
| |
Summary | |
| |
| |
Test Your Skills | |
| |
| |
| |
Ethical and Professional Responsibility in Testimony | |
| |
| |
The Importance of Forensic Expert Witnesses and Expert Reports | |
| |
| |
The Trial Process | |
| |
| |
Guidelines for Testifying | |
| |
| |
Professional and Educational Resources | |
| |
| |
Summary | |
| |
| |
Test Your Skills | |
| |
| |
| |
Online Resources | |
| |
| |
| |
Government and Legal References | |
| |
| |
| |
Sample Legal Forms, Letters, and Motions | |
| |
| |
| |
Summaries of Court Cases | |
| |
| |
Glossary | |
| |
| |
References | |
| |
| |
Index | |