Computer Forensics For Dummies

Höfundur Linda Volonino; Reynaldo Anzaldua

Útgefandi Wiley Professional Development (P&T)

Snið ePub

Print ISBN 9780470371916

Útgáfa 1

Útgáfuár 2008

2.790 kr.

Description

Efnisyfirlit

  • Introduction
  • Who Should Read This Book?
  • About This Book
  • How to Use This Book
  • What You Don’t Need to Read
  • Foolish Assumptions
  • How This Book Is Organized
  • Part I: Digging Out and Documenting Electronic Evidence
  • Part II: Preparing to Crack the Case
  • Part III: Doing Computer Forensic Investigations
  • Part IV: Succeeding in Court
  • Part V: The Part of Tens
  • Glossary
  • About the Web Site and Blog
  • Icons Used in This Book
  • Where to Go from Here
  • Part I: Digging Out and Documenting Electronic Evidence
  • Chapter 1: Knowing What Your Digital Devices Create, Capture, and Pack Away — Until Revelation Day
  • Living and Working in a Recorded World
  • Deleting is a misnomer
  • Getting backed up
  • Delusions of privacy danced in their headsets
  • Giving the Third Degree to Computers, Electronics, and the Internet
  • Answering the Big Questions
  • What is my computer doing behind my back?
  • How does my data get out there?
  • Why can data be discovered and recovered easily?
  • Examining Investigative Methods
  • Getting permission
  • Choosing your forensic tools
  • Knowing what to look for and where
  • Gathering evidence properly
  • Revealing Investigation Results
  • Preparing bulletproof findings
  • Making it through trial
  • Chapter 2: Suiting Up for a Lawsuit or Criminal Investigation
  • Deciphering the Legal Codes
  • Learning about relevancy and admissibility
  • Getting started with electronic discovery
  • Deciding what’s in and what’s not
  • Playing by the rules
  • Managing E-Discovery
  • Understanding that timing is everything
  • Grasping ESI discovery problems
  • Avoiding overbroad requests
  • Shaping the request
  • Stepping through the response
  • Conducting the Investigation in Good Faith
  • Deciding Who’s Paying the Bill
  • Chapter 3: Getting Authorized to Search and Seize
  • Getting Authority: Never Start Without It
  • Acknowledging who’s the boss (not you!)
  • Putting together your team
  • Involving external sources
  • No warrant, no problem (if it’s done legally)
  • Criminal Cases: Papering Your Behind (CYA)
  • Learning about the case and the target
  • Drafting an affidavit for a search warrant
  • Presenting an affidavit for judicial processing
  • Civil Cases: Verifying Company Policy
  • Searching with verbal permission (without a warrant)
  • Obtaining a subpoena
  • Chapter 4: Documenting and Managing the Crime Scene
  • Obsessing over Documentation
  • Keeping the chain complete
  • Dealing with carbon memories
  • Deciding who gets the evidence first
  • Getting to the truth
  • Directing the Scene
  • Papering the trail
  • Recording the scene: Video
  • Recording the sounds: Audio
  • Getting the lead out
  • Managing Evidence Behind the Yellow Tape
  • Arriving ready to roll: Bringing the right tools
  • Minimizing your presence
  • Stepping Through the Scene
  • Securing the area
  • Surveying the scene
  • Transporting the e-evidence
  • Part II: Preparing to Crack the Case
  • Chapter 5: Minding and Finding the Loopholes
  • Deciding to Take On a Client
  • Learning about the case and the theory
  • Finding out the client’s priorities
  • Timing your work
  • Defining the scope of work
  • Determining Whether You Can Help the Case
  • Serving as a resource for the lawyer
  • Taking an active role
  • Answering big, blunt questions
  • Signing on the dotted line
  • Passing the Court’s Standard As a Reliable Witness
  • Getting your credentials accepted
  • Impressing opinions on the jury
  • Going Forward with the Case
  • Digging into the evidence
  • Organizing and documenting your work
  • Researching and digging for intelligence
  • Keeping a Tight Forensic Defense
  • Plugging loopholes
  • Chapter 6: Acquiring and Authenticating E-Evidence
  • Acquiring E-Evidence Properly
  • Step 1: Determine the Type of Media You’re Working With
  • Step 2: Find the Right Tool
  • Finding all the space
  • A write-protect device
  • Sterile media
  • Step 3: Transfer Data
  • Transferring data in the field
  • From computer to computer
  • From storage device to computer
  • Step 4: Authenticate the Preserved Data
  • Step 5: Make a Duplicate of the Duplicate
  • Chapter 7: Examining E-Evidence
  • The Art of Scientific Inquiry
  • Gearing Up for Challenges
  • Getting a Handle on Search Terms
  • Defining your search list
  • Using forensic software to search
  • Assuming risks
  • Challenging Your Results: Plants and Frames and Being in the Wrong Place
  • Knowing what can go wrong
  • Looking beyond the file
  • Finding No Evidence
  • No evidence of who logged in
  • No evidence of how it got there
  • Reporting Your Analysis
  • Chapter 8: Extracting Hidden Data
  • Recognizing Attempts to Blind the Investigator
  • Encryption and compression
  • Data hiding techniques
  • Defeating Algorithms, Hashes, and Keys
  • Finding Out-of-Sight Bytes
  • Cracking Passwords
  • Knowing when to crack and when not to crack
  • Disarming passwords to get in
  • Circumventing passwords to sneak in
  • Decrypting the Encrypted
  • Sloppiness cracks PGP
  • Desperate measures
  • Part III: Doing Computer Forensics Investigations
  • Chapter 9: E-Mail and Web Forensics
  • Opening Pandora’s Box of E-Mail
  • Following the route of e-mail packets
  • Becoming Exhibit A
  • Tracking the biggest trend in civil litigation
  • Scoping Out E-Mail Architecture
  • E-mail structures
  • E-mail addressing
  • E-mail lingo
  • E-mail in motion
  • Seeing the E-Mail Forensics Perspective
  • Dissecting the message
  • Expanding headers
  • Checking for e-mail extras
  • Examining Client-Based E-Mail
  • Extracting e-mail from clients
  • Getting to know e-mail file extensions
  • Copying the e-mail
  • Printing the e-mail
  • Investigating Web-Based Mail
  • Searching Browser Files
  • Temporary files
  • Internet history
  • Looking through Instant Messages
  • Chapter 10: Data Forensics
  • Delving into Data Storage
  • The anatomy of a disk drive
  • Microsoft operating systems
  • Apple: HFS
  • Linux/Unix
  • Finding Digital Cavities Where Data Hides
  • Deleted files
  • Non-accessible space
  • RAM
  • Windows Registry
  • Search filtering
  • Extracting Data
  • Rebuilding Extracted Data
  • Chapter 11: Document Forensics
  • Finding Evidential Material in Documents: Metadata
  • Viewing metadata
  • Extracting metadata
  • Honing In on CAM (Create, Access, Modify) Facts
  • Discovering Documents
  • Luring documents out of local storage
  • Finding links and external storage
  • Rounding up backups
  • Chapter 12: Mobile Forensics
  • Keeping Up with Data on the Move
  • Shifting from desktop to handhelds
  • Considering mobile devices forensically
  • Recognizing the imperfect understanding of the technology
  • Making a Device Seizure
  • Mobile phones and SIM cards
  • Personal digital assistants
  • Digital cameras
  • Digital audio recorders
  • Cutting-Edge Cellular Extractions
  • Equipping for mobile forensics
  • Mobile forensic hardware
  • Securing the mobile device
  • Finding mobile data
  • Examining a smart phone step-by-step
  • Chapter 13: Network Forensics
  • Mobilizing Network Forensic Power
  • Identifying Network Components
  • Looking at the Open Systems Interconnection Model (OSI)
  • Cooperating with secret agents and controlling servers
  • Saving Network Data
  • Categorizing the data
  • Figuring out where to store all those bytes
  • Re-Creating an Event from Traffic
  • Analyzing time stamps
  • Putting together a data sequence
  • Spotting different data streams
  • Looking at Network Forensic Tools
  • Test Access Port (TAP)
  • Mirrors
  • Promiscuous NIC
  • Wireless
  • Discovering Network Forensic Vendors
  • Chapter 14: Investigating X-Files: eXotic Forensics
  • Taking a Closer Look at Answering Machines
  • Examining Video Surveillance Systems
  • Cracking Home Security Systems
  • Tracking Automobiles
  • Extracting Information from Radio Frequency Identification (RFID)
  • Examining Copiers
  • Taking a Look On the Horizon
  • Part IV: Succeeding in Court
  • Chapter 15: Holding Up Your End at Pretrial
  • Pretrial Motions
  • Motion to suppress evidence
  • Motion in limine
  • Motion to dismiss
  • Other motions
  • Handling Pretrial Hearings
  • Giving a Deposition
  • Swearing to tell truthful opinions
  • Surviving a deposition
  • Bulletproofing your opinions
  • Checking your statements
  • Fighting stage fright
  • Chapter 16: Winning a Case Before You Go to Court
  • Working Around Wrong Moves
  • Responding to Opposing Experts
  • Dealing with counterparts
  • Formatting your response
  • Responding to affidavits
  • Hardening your testimony
  • Chapter 17: Standing Your Ground in Court
  • Making Good on Deliverables
  • Understanding Barroom Brawls in the Courtroom
  • Managing challenging issues
  • Sitting on the stand
  • Instructing jurors about expert testimony
  • Presenting E-Evidence to Persuade
  • Staging a disaster
  • Exhibiting like an expert
  • Communicating to the Court
  • Giving testimony about the case
  • Answering about yourself
  • Getting paid without conflict
  • Chapter 18: Ten Ways to Get Qualified and Prepped for Success
  • The Front Ten: Certifications
  • ACE: AccessData
  • CCE: Certified Computer Examiner
  • CFCE: Certified Forensic Computer Examiner
  • CEECS: Certified Electronic Evidence Collection Specialist
  • Cisco: Various certifications
  • CISSP: Certified Information Systems Security Professional
  • CompTia: Various certifications
  • EnCE: Guidance Software
  • Paraben training
  • SANS and GCFA: GIAC Certified Forensics Analyst
  • The Back Ten: Journals and Education
  • Chapter 19: Ten Tactics of an Excellent Investigator and a Dangerous Expert Witness
  • Stick to Finding and Telling the Truth
  • Don’t Fall for Counsel’s Tricks in Court
  • Be Irrefutable
  • Submit a Descriptive, Complete Bill
  • Prepare a Clear, Complete Report
  • Understand Nonverbal Cues
  • Look ’Em Straight in the Eye
  • Dress for Your Role As a Professional
  • Stay Certified and Up-to-Date
  • Know When to Say No
  • Chapter 20: Ten Cool Tools for Computer Forensics
  • Computer Forensic Software Tools
  • EnCase
  • Forensic ToolKit (FTK)
  • Device Seizure
  • Computer Forensic Hardware
  • FRED
  • WiebeTech Forensic Field Kit
  • Logicube
  • Computer Forensic Laboratories
  • Computer forensic data server
  • Forensic write blockers
  • Media wiping equipment
  • Recording equipment
  • Glossary
  • Cheat Sheet
  • Connect with Dummies
  • End User License Agreement
Show More

Additional information

Veldu vöru

Rafbók til eignar

Reviews

There are no reviews yet.

Be the first to review “Computer Forensics For Dummies”

Netfang þitt verður ekki birt. Nauðsynlegir reitir eru merktir *

Aðrar vörur

1
    1
    Karfan þín
    6+1 Proposals for Journalism
    6+1 Proposals for Journalism
    Veldu vöru:

    Rafbók til eignar

    1 X 9.590 kr. = 9.590 kr.