Custom cover image
Custom cover image

Digital forensics : threatscape and best practices / edited by John Sammons, Assistant Professor and Director of the Digital Forensics and Information Assurance Program, Marshall University, Huntington, WV, USA

Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Amsterdam ; Heidelberg : Syngress, an imprint of Elsevier, [2016]Description: 1 Online-Ressource (160 Seiten)ISBN:
  • 9780128045428
  • 0128045264
Subject(s): Additional physical formats: 9780128045268 DDC classification:
  • 363.25968 23
  • 363.256 23
LOC classification:
  • HV8079.C65
Online resources:
Contents:
Cover; Title Page; Copyright Page; Dedication; Contents; List of Contributors; Editor Biography; Biographies; Acknowledgments; Chapter 1 - The cryptocurrency enigma; Purpose; Introduction; What makes a currency?; Cryptocurrency; Public key encryption basics; Forensic relevance; Bitcoin; History and current context; Bitcoin framework; Blockchain; Wallets and addresses; Transaction; Verification; Mining; Blockchain explorers; Bitcoin protocol; Forensic artifacts; Multibit HD; Blockchain transaction details; Multibit log; The bitcoin protocol in action; Inv packet; Inv packet data
Getdata packetGetdata packet data; TX packet; TX packet data; Summary; References; Chapter 2 - The key to forensic success: examination planning is a key determinant of efficient and effective digital forensics; Introduction; The four phases of digital forensics; It is a matter of questions; Investigative questions; Legal questions; Forensic questions; Identification; Classification/individualization; Association; Reconstruction; Forensic questions as a bridge; Developing forensic hypotheses; Knowing how far to go; Starting the plan; How do you know when you are done?
Examination phase - data extractionThe forensic analysis; The examination planning process; Conclusion; Examination Planning References; Chapter 3 - Psychological profiling as an investigative tool for digital forensics; Current model; Issues; Volume of data; Lack of context; Accountability; New model; Phases; Classification; Context analysis; Collection; Statistical analysis; Timeline analysis/visualization; Decision/opinion; Limitations; Case studies; Case study 1 - shaken baby death; Case study 2 - arson homicide; Case study 3 - possession of child porn; Conclusions; References
Chapter 4 - The intersection between social media, crime, and digital forensics: #WhoDunIt?Introduction; Social media and crime; Social media and digital forensics; Social media evidence on the network; Social media evidence on the physical device; Summary; References; Chapter 5 - Mobile device forensics: threats, challenges, and future trends; Introduction; The hardware versus software complexity trend; Cloud services and mobile platforms - inherent vulnerabilities; There is an app for that - forensic challenges and threats within apps; Social media apps; Native and non-native messaging apps
Multimedia and VoIP "streaming" appsCloud-based storage apps; Camera-enabled apps; Location data and apps; Geotagging and EXIF data within apps; Persistent threats and challenges - what lies ahead for mobile device forensics; Data encryption and stronger passwords; "Burner" and Chinese phones; JTAG and Chipoff analysis - advantages, challenges, and threats; Validation and best practices of mobile forensic tools and methods - the forensic enigma; Conclusion; References; Chapter 6 - Digital forensics in an eDiscovery world; Introduction; eDiscovery processes and EDRM; Cat or dog not mouse
Cat w/10 dog
Summary: Information security practitioners are faced with a never-ending stream of threats and attacks, and need to be aware of how these threats and attacks are continually evolving. One of the primary challenges is keeping up with the sheer volume of information around these threats and making sense of the patterns as they evolve. Information Security and Digital Forensics: Threatscape and Best Practicesprovides you with incisive analysis from a panel of expert authors, led by John Sammons, bestselling author of The Basics of Digital Forensics. This complete reference surveys the landscape of information security threats and provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and researchers alike with a comprehensive and coherent overview of the threat landscape and what can be done to manage and prepare for it, including insights in each of five core topics: Digital Forensics, Information Assurance/Security, CyberCrime, Open Source Intelligence, and Electronic Discovery.The only book to provide comprehensive overview and analysis of the threat landscape and best practices for defending against various attack vectors.Most resources focus on specific types of threats or attacks - this book gives you an overview of the lay of the land that helps practitioners and researchers alike in understanding how the strategic environment is evolving.Learn about the threatscape and best practices for defense in five key areas: Digital Forensics, Information Assurance/Security, CyberCrime, Open Source Intelligence, and Electronic Discovery.PPN: PPN: 845156993Package identifier: Produktsigel: ZDB-30-PAD | ZDB-30-PQE
No physical items for this record