Computer Forensics For Dummies

Höfundur Linda Volonino; Reynaldo Anzaldua

Útgefandi Wiley Professional Development (P&T)

Snið ePub

Print ISBN 9780470371916

Útgáfa 1

Útgáfuár 2008

2.590 kr.

Description

Efnisyfirlit

  • Introduction
  • Who Should Read This Book?
  • About This Book
  • How to Use This Book
  • What You Don’t Need to Read
  • Foolish Assumptions
  • How This Book Is Organized
  • Part I: Digging Out and Documenting Electronic Evidence
  • Part II: Preparing to Crack the Case
  • Part III: Doing Computer Forensic Investigations
  • Part IV: Succeeding in Court
  • Part V: The Part of Tens
  • Glossary
  • About the Web Site and Blog
  • Icons Used in This Book
  • Where to Go from Here
  • Part I: Digging Out and Documenting Electronic Evidence
  • Chapter 1: Knowing What Your Digital Devices Create, Capture, and Pack Away — Until Revelation Day
  • Living and Working in a Recorded World
  • Deleting is a misnomer
  • Getting backed up
  • Delusions of privacy danced in their headsets
  • Giving the Third Degree to Computers, Electronics, and the Internet
  • Answering the Big Questions
  • What is my computer doing behind my back?
  • How does my data get out there?
  • Why can data be discovered and recovered easily?
  • Examining Investigative Methods
  • Getting permission
  • Choosing your forensic tools
  • Knowing what to look for and where
  • Gathering evidence properly
  • Revealing Investigation Results
  • Preparing bulletproof findings
  • Making it through trial
  • Chapter 2: Suiting Up for a Lawsuit or Criminal Investigation
  • Deciphering the Legal Codes
  • Learning about relevancy and admissibility
  • Getting started with electronic discovery
  • Deciding what’s in and what’s not
  • Playing by the rules
  • Managing E-Discovery
  • Understanding that timing is everything
  • Grasping ESI discovery problems
  • Avoiding overbroad requests
  • Shaping the request
  • Stepping through the response
  • Conducting the Investigation in Good Faith
  • Deciding Who’s Paying the Bill
  • Chapter 3: Getting Authorized to Search and Seize
  • Getting Authority: Never Start Without It
  • Acknowledging who’s the boss (not you!)
  • Putting together your team
  • Involving external sources
  • No warrant, no problem (if it’s done legally)
  • Criminal Cases: Papering Your Behind (CYA)
  • Learning about the case and the target
  • Drafting an affidavit for a search warrant
  • Presenting an affidavit for judicial processing
  • Civil Cases: Verifying Company Policy
  • Searching with verbal permission (without a warrant)
  • Obtaining a subpoena
  • Chapter 4: Documenting and Managing the Crime Scene
  • Obsessing over Documentation
  • Keeping the chain complete
  • Dealing with carbon memories
  • Deciding who gets the evidence first
  • Getting to the truth
  • Directing the Scene
  • Papering the trail
  • Recording the scene: Video
  • Recording the sounds: Audio
  • Getting the lead out
  • Managing Evidence Behind the Yellow Tape
  • Arriving ready to roll: Bringing the right tools
  • Minimizing your presence
  • Stepping Through the Scene
  • Securing the area
  • Surveying the scene
  • Transporting the e-evidence
  • Part II: Preparing to Crack the Case
  • Chapter 5: Minding and Finding the Loopholes
  • Deciding to Take On a Client
  • Learning about the case and the theory
  • Finding out the client’s priorities
  • Timing your work
  • Defining the scope of work
  • Determining Whether You Can Help the Case
  • Serving as a resource for the lawyer
  • Taking an active role
  • Answering big, blunt questions
  • Signing on the dotted line
  • Passing the Court’s Standard As a Reliable Witness
  • Getting your credentials accepted
  • Impressing opinions on the jury
  • Going Forward with the Case
  • Digging into the evidence
  • Organizing and documenting your work
  • Researching and digging for intelligence
  • Keeping a Tight Forensic Defense
  • Plugging loopholes
  • Chapter 6: Acquiring and Authenticating E-Evidence
  • Acquiring E-Evidence Properly
  • Step 1: Determine the Type of Media You’re Working With
  • Step 2: Find the Right Tool
  • Finding all the space
  • A write-protect device
  • Sterile media
  • Step 3: Transfer Data
  • Transferring data in the field
  • From computer to computer
  • From storage device to computer
  • Step 4: Authenticate the Preserved Data
  • Step 5: Make a Duplicate of the Duplicate
  • Chapter 7: Examining E-Evidence
  • The Art of Scientific Inquiry
  • Gearing Up for Challenges
  • Getting a Handle on Search Terms
  • Defining your search list
  • Using forensic software to search
  • Assuming risks
  • Challenging Your Results: Plants and Frames and Being in the Wrong Place
  • Knowing what can go wrong
  • Looking beyond the file
  • Finding No Evidence
  • No evidence of who logged in
  • No evidence of how it got there
  • Reporting Your Analysis
  • Chapter 8: Extracting Hidden Data
  • Recognizing Attempts to Blind the Investigator
  • Encryption and compression
  • Data hiding techniques
  • Defeating Algorithms, Hashes, and Keys
  • Finding Out-of-Sight Bytes
  • Cracking Passwords
  • Knowing when to crack and when not to crack
  • Disarming passwords to get in
  • Circumventing passwords to sneak in
  • Decrypting the Encrypted
  • Sloppiness cracks PGP
  • Desperate measures
  • Part III: Doing Computer Forensics Investigations
  • Chapter 9: E-Mail and Web Forensics
  • Opening Pandora’s Box of E-Mail
  • Following the route of e-mail packets
  • Becoming Exhibit A
  • Tracking the biggest trend in civil litigation
  • Scoping Out E-Mail Architecture
  • E-mail structures
  • E-mail addressing
  • E-mail lingo
  • E-mail in motion
  • Seeing the E-Mail Forensics Perspective
  • Dissecting the message
  • Expanding headers
  • Checking for e-mail extras
  • Examining Client-Based E-Mail
  • Extracting e-mail from clients
  • Getting to know e-mail file extensions
  • Copying the e-mail
  • Printing the e-mail
  • Investigating Web-Based Mail
  • Searching Browser Files
  • Temporary files
  • Internet history
  • Looking through Instant Messages
  • Chapter 10: Data Forensics
  • Delving into Data Storage
  • The anatomy of a disk drive
  • Microsoft operating systems
  • Apple: HFS
  • Linux/Unix
  • Finding Digital Cavities Where Data Hides
  • Deleted files
  • Non-accessible space
  • RAM
  • Windows Registry
  • Search filtering
  • Extracting Data
  • Rebuilding Extracted Data
  • Chapter 11: Document Forensics
  • Finding Evidential Material in Documents: Metadata
  • Viewing metadata
  • Extracting metadata
  • Honing In on CAM (Create, Access, Modify) Facts
  • Discovering Documents
  • Luring documents out of local storage
  • Finding links and external storage
  • Rounding up backups
  • Chapter 12: Mobile Forensics
  • Keeping Up with Data on the Move
  • Shifting from desktop to handhelds
  • Considering mobile devices forensically
  • Recognizing the imperfect understanding of the technology
  • Making a Device Seizure
  • Mobile phones and SIM cards
  • Personal digital assistants
  • Digital cameras
  • Digital audio recorders
  • Cutting-Edge Cellular Extractions
  • Equipping for mobile forensics
  • Mobile forensic hardware
  • Securing the mobile device
  • Finding mobile data
  • Examining a smart phone step-by-step
  • Chapter 13: Network Forensics
  • Mobilizing Network Forensic Power
  • Identifying Network Components
  • Looking at the Open Systems Interconnection Model (OSI)
  • Cooperating with secret agents and controlling servers
  • Saving Network Data
  • Categorizing the data
  • Figuring out where to store all those bytes
  • Re-Creating an Event from Traffic
  • Analyzing time stamps
  • Putting together a data sequence
  • Spotting different data streams
  • Looking at Network Forensic Tools
  • Test Access Port (TAP)
  • Mirrors
  • Promiscuous NIC
  • Wireless
  • Discovering Network Forensic Vendors
  • Chapter 14: Investigating X-Files: eXotic Forensics
  • Taking a Closer Look at Answering Machines
  • Examining Video Surveillance Systems
  • Cracking Home Security Systems
  • Tracking Automobiles
  • Extracting Information from Radio Frequency Identification (RFID)
  • Examining Copiers
  • Taking a Look On the Horizon
  • Part IV: Succeeding in Court
  • Chapter 15: Holding Up Your End at Pretrial
  • Pretrial Motions
  • Motion to suppress evidence
  • Motion in limine
  • Motion to dismiss
  • Other motions
  • Handling Pretrial Hearings
  • Giving a Deposition
  • Swearing to tell truthful opinions
  • Surviving a deposition
  • Bulletproofing your opinions
  • Checking your statements
  • Fighting stage fright
  • Chapter 16: Winning a Case Before You Go to Court
  • Working Around Wrong Moves
  • Responding to Opposing Experts
  • Dealing with counterparts
  • Formatting your response
  • Responding to affidavits
  • Hardening your testimony
  • Chapter 17: Standing Your Ground in Court
  • Making Good on Deliverables
  • Understanding Barroom Brawls in the Courtroom
  • Managing challenging issues
  • Sitting on the stand
  • Instructing jurors about expert testimony
  • Presenting E-Evidence to Persuade
  • Staging a disaster
  • Exhibiting like an expert
  • Communicating to the Court
  • Giving testimony about the case
  • Answering about yourself
  • Getting paid without conflict
  • Chapter 18: Ten Ways to Get Qualified and Prepped for Success
  • The Front Ten: Certifications
  • ACE: AccessData
  • CCE: Certified Computer Examiner
  • CFCE: Certified Forensic Computer Examiner
  • CEECS: Certified Electronic Evidence Collection Specialist
  • Cisco: Various certifications
  • CISSP: Certified Information Systems Security Professional
  • CompTia: Various certifications
  • EnCE: Guidance Software
  • Paraben training
  • SANS and GCFA: GIAC Certified Forensics Analyst
  • The Back Ten: Journals and Education
  • Chapter 19: Ten Tactics of an Excellent Investigator and a Dangerous Expert Witness
  • Stick to Finding and Telling the Truth
  • Don’t Fall for Counsel’s Tricks in Court
  • Be Irrefutable
  • Submit a Descriptive, Complete Bill
  • Prepare a Clear, Complete Report
  • Understand Nonverbal Cues
  • Look ’Em Straight in the Eye
  • Dress for Your Role As a Professional
  • Stay Certified and Up-to-Date
  • Know When to Say No
  • Chapter 20: Ten Cool Tools for Computer Forensics
  • Computer Forensic Software Tools
  • EnCase
  • Forensic ToolKit (FTK)
  • Device Seizure
  • Computer Forensic Hardware
  • FRED
  • WiebeTech Forensic Field Kit
  • Logicube
  • Computer Forensic Laboratories
  • Computer forensic data server
  • Forensic write blockers
  • Media wiping equipment
  • Recording equipment
  • Glossary
  • Cheat Sheet
  • Connect with Dummies
  • End User License Agreement

Additional information

Veldu vöru

Rafbók til eignar

Aðrar vörur

0
    0
    Karfan þín
    Karfan þín er tómAftur í búð