Book description
Learn to pull “digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at “not yet every day devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes.
- Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense
- Book presents "one of a kind" bleeding edge information that absolutely can not be found anywhere else
- Today the industry has exploded and cyber investigators can be found in almost every field
Table of contents
- Front Cover
- Alternate Data Storage Forensics
- Copyright Page (1/2)
- Copyright Page (2/2)
- Contents (1/2)
- Contents (2/2)
-
Chapter 1. Digital Forensics and Analyzing Data
- Introduction
- The Evolution of Computer Forensics
- Phases of Digital Forensics (1/7)
- Phases of Digital Forensics (2/7)
- Phases of Digital Forensics (3/7)
- Phases of Digital Forensics (4/7)
- Phases of Digital Forensics (5/7)
- Phases of Digital Forensics (6/7)
- Phases of Digital Forensics (7/7)
- Summary
- References
- Solutions Fast Track
- Frequently Asked Questions
-
Chapter 2. Seizure of Digital Information
- Introduction
- Defining Digital Evidence
- Digital Evidence Seizure Methodology (1/2)
- Digital Evidence Seizure Methodology (2/2)
- Factors Limiting the Wholesale Seizure of Hardware (1/2)
- Factors Limiting the Wholesale Seizure of Hardware (2/2)
- Other Options for Seizing Digital Evidence (1/4)
- Other Options for Seizing Digital Evidence (2/4)
- Other Options for Seizing Digital Evidence (3/4)
- Other Options for Seizing Digital Evidence (4/4)
- Common Threads within Digital Evidence Seizure
- Determining the Most Appropriate Seizure Method
- Summary
- Works Cited
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 3. Introduction to Handheld Forensics
-
Chapter 4. PDA, Blackberry, and iPod Forensic Analysis
- Introduction
- PDA Forensics
- PDA Investigative Tips
- Expansion Sleeve Removed
- Deploying PDA Forensic Tools
- Introduction to the Blackberry
- Security for Stored Data
- Forensic Examination of a Blackberry
- Attacking The Blackberry
- Securing the Blackberry (RIM)
- iPod Forensics
- Misuse of an iPod
- iPod Investigation
- The iPod and Windows
- The iPod and Linux
- User Accounts
- Deleted Files
- iPod Time Issues
- Registry Key Containing the iPod’s USB/Firewire Serial Number
- iPod Tools
- Summary
- Notes
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 5. E-mail Forensics
- Chapter 6. Router Forensics
- Chapter 7. Legal Issues of Intercepting WiFi Transmissions
-
Chapter 8. CD and DVD Forensics
- Physical Characteritics of CD and DVD Media
- CD Features (1/5)
- CD Features (2/5)
- CD Features (3/5)
- CD Features (4/5)
- CD Features (5/5)
- CD and DVD Logical Structure (1/4)
- CD and DVD Logical Structure (2/4)
- CD and DVD Logical Structure (3/4)
- CD and DVD Logical Structure (4/4)
- Space Allocation by CD and DVD File Systems
- Disc Accessibility Problems
- Forensic Binary Images
- Collecting CD and DVD Evidence
- Preparing for Disc Examination (1/2)
- Preparing for Disc Examination (2/2)
-
Chapter 9. MP3 Forensics
- Introduction
- History
- Why Is an iPod Considered Alternative Media?
- Imaging and Hashing
- Hardware vs . Nonhardware Imaging (1/2)
- Hardware vs . Nonhardware Imaging (2/2)
- Types of iPods
- File Systems
- “Hacking Tools” and Encrypted Home Directories
- Evidence: Normal vs . Not Normal (1/3)
- Evidence: Normal vs . Not Normal (2/3)
- Evidence: Normal vs . Not Normal (3/3)
- Analysis Tools
- Summary
- Index (1/5)
- Index (2/5)
- Index (3/5)
- Index (4/5)
- Index (5/5)
Product information
- Title: Alternate Data Storage Forensics
- Author(s):
- Release date: April 2011
- Publisher(s): Syngress
- ISBN: 9780080554754
You might also like
book
Windows® Sysinternals Administrator’s Reference
Get in-depth guidance—and inside insights—for using the Windows Sysinternals tools available from Microsoft TechNet. Guided by …
book
The Best Damn Cybercrime and Digital Forensics Book Period
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched …
book
Windows Forensics Analyst Field Guide
Build your expertise in Windows incident analysis by mastering artifacts and techniques for efficient cybercrime investigation …
book
Anonymous Communication Networks
This book examines anonymous communication networks as a solution to Internet privacy concerns. It explores various …