Skip to Main Content
Cyber Forensics, 2nd Edition
book

Cyber Forensics, 2nd Edition

by Albert Marcella Jr., Doug Menendez
December 2010
Intermediate to advanced content levelIntermediate to advanced
528 pages
18h 51m
English
Auerbach Publications
Content preview from Cyber Forensics, 2nd Edition
168 Cyber Forensics Field Manual, Second Edition
cannot conclusively confi rm the identity of the attacking host. Moreover, if the IP address is
for the attacker’s system, the attacker might see the traffi c and react by destroying evidence
or attacking the host sending the traffi c. If the IP address is spoofed, sending unsolicited
network traffi c to the system could be interpreted as unauthorized use or an attack. Under
no circumstances should investigators attempt to gain access to others’ systems without
permission.
Seek ISP Assistance: ISPs generally require a court order before providing any information
to an organization about suspicious network activity. Accordingly, ISP assistance is generally
an option during only the most serious net ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Digital Forensics and Incident Response - Second Edition

Digital Forensics and Incident Response - Second Edition

Gerard Johansen
Digital Forensics

Digital Forensics

John Sammons
Cyber Security and Digital Forensics

Cyber Security and Digital Forensics

Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le

Publisher Resources

ISBN: 9781439848234