Investigating Computer- Related Crime a Handbook for Corporate Investigators

Free Download

Authors:

Edition: 1

ISBN: 9780849322181, 0-8493-2218-9

Size: 3 MB (3399428 bytes)

Pages: 295/295

File format:

Language:

Publishing Year:

Category:

Peter Stephenson, Keith Gilbert9780849322181, 0-8493-2218-9

Written by an experienced information security specialist,Investigating Computer-Related Crime: A Handbook For Corporate Investigators is tailored to the needs of corporate information professionals and investigatorsIt gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic techniques you need to preserve the security of your company’s informationInvestigating Computer-Related Crime discusses the nature of cyber crime, its impact in the 21st century, its investigation and the difficulties encountered by both public law enforcement officials and private investigators. By detailing an investigation and providing helpful case studies, this book offers insights into collecting and preserving evidence, interrogating suspects and witnesses, handling the crime in progress, and issues in involving the authorities. The seasoned author offers valuable, firsthand information on using the forensic utilities for preserving evidence and searching for hidden information, to help you devise solutions to the computer-related crimes that threaten the well-being of your companyBooknewsDiscusses the nature of cyber crime, its impact in the 21st century, its investigation, and difficulties encountered by both public law enforcement officials and private investigators. Offers a step-by-step approach to understanding and investigating security problems, technical and legal information, and computer forensic techniques, and gives advice on collecting and preserving evidence, interrogating suspects, handling crime in progress, and involving authorities. For corporate information professionals and investigators. The author has been a network consultant and lecturer for 18 years, specializing in information protection for large enterprises.

Table of contents :
Investigating Computer-Related Crime……Page 1
Preface……Page 3
About the Author……Page 5
Acknowledgments……Page 6
Dedication……Page 7
Contents……Page 8
Section 1 – The Nature of Cyber Crime……Page 17
1 – Cyber Crime as We Enter the Twenty-First Century……Page 18
2 – The Potential Impacts of Cyber Crime……Page 30
3 – Rogue Code Attacks……Page 45
4 – Surgical Strikes and Shotgun Blasts……Page 58
Section 2 – Investigating Cyber Crime……Page 73
5 – A Framework for Conducting an Investigation for a Computer Security Incident……Page 74
6 – Look for the Hidden Flaw……Page 92
7 – Analyzing the Remnants of a Computer Security Incident……Page 105
8 – Launching the Investigation……Page 130
9 – Determining If a Crime Has Taken Place……Page 158
10 – Handling the Crime in Progress……Page 180
11 – “It Never Happened” – Cover-Ups Are Common……Page 196
12 – Involving the Authorities……Page 205
13 – When an Investigation Can’t Continue……Page 214
Section 3 – Preparing for Cyber Crime……Page 222
14 – Building a Corporate Cyber “SWAT Team”……Page 223
15 – Privacy and Computer Crime……Page 240
Section 4 – Using the Forensic Utilities……Page 247
Preface – How the Section Is Organized……Page 248
16 – Preserving Evidence – Basic Concepts……Page 249
17 – Collecting Evidence – First Steps……Page 254
18 – Searching for Hidden Information……Page 260
19 – Handling Floppy Disks……Page 268
Appendix A – Introduction to Denial of Service Attacks……Page 271
Appendix B – Technical Report 540-96……Page 287

Reviews

There are no reviews yet.

Be the first to review “Investigating Computer- Related Crime a Handbook for Corporate Investigators”
Shopping Cart
Scroll to Top