Peter Stephenson, Keith Gilbert9780849322181, 0-8493-2218-9
Written by an experienced information security specialist,Investigating Computer-Related Crime: A Handbook For Corporate Investigators is tailored to the needs of corporate information professionals and investigatorsIt gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic techniques you need to preserve the security of your company’s informationInvestigating Computer-Related Crime discusses the nature of cyber crime, its impact in the 21st century, its investigation and the difficulties encountered by both public law enforcement officials and private investigators. By detailing an investigation and providing helpful case studies, this book offers insights into collecting and preserving evidence, interrogating suspects and witnesses, handling the crime in progress, and issues in involving the authorities. The seasoned author offers valuable, firsthand information on using the forensic utilities for preserving evidence and searching for hidden information, to help you devise solutions to the computer-related crimes that threaten the well-being of your companyBooknewsDiscusses the nature of cyber crime, its impact in the 21st century, its investigation, and difficulties encountered by both public law enforcement officials and private investigators. Offers a step-by-step approach to understanding and investigating security problems, technical and legal information, and computer forensic techniques, and gives advice on collecting and preserving evidence, interrogating suspects, handling crime in progress, and involving authorities. For corporate information professionals and investigators. The author has been a network consultant and lecturer for 18 years, specializing in information protection for large enterprises. |
Table of contents : Investigating Computer-Related Crime……Page 1 Preface……Page 3 About the Author……Page 5 Acknowledgments……Page 6 Dedication……Page 7 Contents……Page 8 Section 1 – The Nature of Cyber Crime……Page 17 1 – Cyber Crime as We Enter the Twenty-First Century……Page 18 2 – The Potential Impacts of Cyber Crime……Page 30 3 – Rogue Code Attacks……Page 45 4 – Surgical Strikes and Shotgun Blasts……Page 58 Section 2 – Investigating Cyber Crime……Page 73 5 – A Framework for Conducting an Investigation for a Computer Security Incident……Page 74 6 – Look for the Hidden Flaw……Page 92 7 – Analyzing the Remnants of a Computer Security Incident……Page 105 8 – Launching the Investigation……Page 130 9 – Determining If a Crime Has Taken Place……Page 158 10 – Handling the Crime in Progress……Page 180 11 – “It Never Happened” – Cover-Ups Are Common……Page 196 12 – Involving the Authorities……Page 205 13 – When an Investigation Can’t Continue……Page 214 Section 3 – Preparing for Cyber Crime……Page 222 14 – Building a Corporate Cyber “SWAT Team”……Page 223 15 – Privacy and Computer Crime……Page 240 Section 4 – Using the Forensic Utilities……Page 247 Preface – How the Section Is Organized……Page 248 16 – Preserving Evidence – Basic Concepts……Page 249 17 – Collecting Evidence – First Steps……Page 254 18 – Searching for Hidden Information……Page 260 19 – Handling Floppy Disks……Page 268 Appendix A – Introduction to Denial of Service Attacks……Page 271 Appendix B – Technical Report 540-96……Page 287 |
Reviews
There are no reviews yet.