Digital Crime and Forensic Science in CyberspacePanagiotis Kanellis Digital forensics is the science of collecting evidence often used in a court of law to prosecute those who engage in digital activities that are deemed unlawful. Digital Crime and Forensic Science in Cyberspace is unique in putting together a number of contributions from leading experts in digital forensics and associated fields, making information on this new and complex subject available in one source of reference that addresses its multifaceted nature. The chapters in this book depict the nature of the crime and the motives of the criminals before proceeding to analyze the type of attacks one must understand in order to be prepared. Digital Crime and Forensic Science in Cyberspace also covers incident preparedness and the tools that are available to the digital investigator, as well as issues that pertain to the education and skills that this new professional must be able to display. |
Contents
Chapter I | 1 |
Chapter II | 27 |
Computer and Network Forensics | 54 |
Copyright | |
14 other sections not shown
Other editions - View all
Common terms and phrases
activities alert algorithm analyze applications attack COBIT computer forensics Copying or distributing Copyright 2006 covert channel criminal cyber crime database developed digital evidence digital forensics disk distributing in print e-mail electronic forms embedding encryption example exploit firewall forensic analysis forensic client forensic computing forensic investigation forensic profile forensic server forms without written framework Fridrich hash host ICMP Idea Group Inc identify incident infected information security information technology governance Internet intrusion detection law enforcement log files machine malicious malware methods monitoring network forensics network security operating systems organizations packet password payload perform pixels print or electronic problem protection protocol response Retrieved July 30 rootkit scanning security policy specific steganalysis steganography stego subnet proxy Symantec Syslog target TcpDump techniques text mining threat validation virus viruses vulnerabilities worms written Figure