Investigative Computer Forensics : the Practical Guide for Lawyers, Accountants, Investigators, and Business Executives.

Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marrie...

Full description

Saved in:
Bibliographic Details
Online Access: Full text (MCPHS users only)
Main Author: Laykin, Erik
Format: Electronic eBook
Language:English
Published: Chichester : Wiley, 2013
Subjects:
Local Note:ProQuest Ebook Central
Table of Contents:
  • Cover; Title Page; Copyright; Dedication; Foreword; Preface; Acknowledgments; Author's Note; Introduction: Investigative Computer Forensics; Changes in Technology; Changes in the Role of the Investigator; What Is Computer Forensics?; Chapter 1: The Glue; The Relevancy of Truth; Foundations of Digital Evidence; Investigative Objectives; The Investigative Process; Trust; Privacy; Chapter 2: A Primer on Computers and Networks; The Mechanics of Electronically Stored Information; Optical Drives; The Server; The Router; Application Data; Metadata; Databases; Internet Data; E-mail Mechanics.
  • The IP AddressComputer Time Artifacts; Social Media; Tablets; Cellular Telephones and Smartphones; Audio and Video; The Global Nervous System: Worldwide Data; Fundamentals of Network Traffic; The Firewall; Data- and Traffic-Gathering Applications; Dynamic Data Capture; The Cloud; International Data Security and Privacy Issues; Chapter 3: Computer Forensic Fundamentals; The Establishment of the Computer Forensic Laboratory; Evidence and Access Controls; The Forensic Workstation; Current Tools and Services; Building a Team and a Process; Computer Forensic Certifications; The Human Quotient.
  • The Devil Is in the DetailsChapter 4: Investigative Fundamentals; The Investigative Mind-Set; Case Management; Fraud and Investigative Analysis; Information Sources and Records; Investigative Techniques; Surveillance and Interviewing; Trade Secret Theft and IP Investigations; Human Resources and Interpersonal Investigations; Reporting and Testifying; Chapter 5: The Underpinnings of Investigative Computer Forensics; Seizure and Examination of Digital Evidence; Data Classification and Records Management; Deleted Data; Backups and Systems Preservation; Computer Crime Analysis and Reconstruction.
  • The Who, What, Where, How of DataContracts Agreements, Third Parties, and Other Headaches; Ethics and Management; Chapter 6: Tactical Objectives and Challenges in Investigative Computer Forensics; Preparing for the Attack; Early Case Assessment; Investigative Pacing, Timing, and Setting Expectations; Working with Multinational Teams; Collections of Electronic Data in the Cloud and in Social Media; Investigating Internet Service Provider Records; Bridging the Actual World with the Cyberworld; Packaging the Findings; Chapter 7: The Cyber-Firefighters; Incident Response Fundamentals.
  • Data BreachesTheft and Fraud; Systems Failures; Internal Investigations; The Real-Time Predicament; Building a Global Resource Network; Honeypots and Other Attractive Intel-Gathering Targets; Databases and Structured Data; Organized Crime in the Cyber-Underworld; The Cyber-Underworld in Various Regions; State-Sponsored Cybercrime; Identity Theft; Intellectual Property and Trade Secret Theft; Botnets, Malware, Trojans, and Phishing; Data Breach Vulnerabilities; Hackers and Their Environment; Chapter 8: E-Discovery Responsibilities; Data Identification; Electronic Discovery Reference Model.