Digital Crime and Forensic Science in Cyberspace
Panagiotis Kanellis, Evangelos Kiountouzis, Nicholas Kolokotronis
Idea Group Inc (IGI), Jan 1, 2006 - Law - 357 pages
Digital forensics is the science of collecting evidence often used in a court of law to prosecute those who engage in digital activities that are deemed unlawful. Digital Crime and Forensic Science in Cyberspace is unique in putting together a number of contributions from leading experts in digital forensics and associated fields, making information on this new and complex subject available in one source of reference that addresses its multifaceted nature.
The chapters in this book depict the nature of the crime and the motives of the criminals before proceeding to analyze the type of attacks one must understand in order to be prepared. Digital Crime and Forensic Science in Cyberspace also covers incident preparedness and the tools that are available to the digital investigator, as well as issues that pertain to the education and skills that this new professional must be able to display.
What people are saying - Write a review
We haven't found any reviews in the usual places.
An Evolving Threat
Chapter III Computer and Network Forensics
The Next Generation
Chapter V Validation of Digital Forensics Tools
Tools and Techniques
Chapter VII Tracing Cyber Crimes with a PrivacyEnabled Forensic Profiling System
A Crime Text Mining Approach
Developing a Security Policy
Chapter XI The Relationship Between Digital Forensics Corporate Governance IT Governance and IS Governance
Cyber Investigation and Training
Trailing Digital Suspects1
The Problem of Developing a Multidisciplinary University Course
Chapter XIV Training the Cyber Investigator
Chapter XV Digital Evidence is Often Evidence of Nothing
About the Authors
Other editions - View all
activities alert algorithm analyze applications attacks chapter COBIT computer crime computer forensics Copying or distributing Copyright covert channel criminal cyber crime database developed digital evidence digital forensics disk distributing in print e-mail electronic forms embedding encryption example exploit firewall forensic analysis forensic client forensic computing forensic investigation forensic profile forensic server forensic tools forms without written framework Fridrich hash host Idea Group Inc identify information security information security governance information technology information technology governance Internet intrusion detection law enforcement log files malicious malware methods monitoring network forensics network security operating systems organizations packet password perform pixels print or electronic protection protocol Retrieved July 30 rootkit scanning security policy specific steganalysis steganography stego subnet proxy Symantec Syslog target TcpDump techniques text mining threat validation virus viruses vulnerabilities worms
Page viii - I have no data yet. It is a capital mistake to theorize before one has data. Insensibly one begins to twist facts to suit theories, instead of theories to suit facts.