Video description
Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been exploited or sold on the criminal markets. Cyber attacks damage both the finances and reputations of businesses and cause damage to the ultimate victims of the crime. From the perspective of the criminal, the current state of inconsistent security policies and lax investigative procedures is a profitable and low-risk opportunity for cyber attacks. They can cause immense harm to individuals or businesses online and make large sums of money-safe in the knowledge that the victim will rarely report the matter to the police. For those tasked with probing such crimes in the field, information on investigative methodology is scarce.
While there are high-quality manuals for conducting digital examinations on a device or network that has been hacked, the Cybercrime Investigators Handbook is the first guide on how to commence an investigation from the location the offence occurred and collect the evidence necessary to locate and prosecute the offender. This valuable contribution to the field teaches listeners to locate, lawfully seize, preserve, examine, interpret, and manage the technical evidence that is vital for effective cybercrime investigation.
Product information
- Title: Cybercrime Investigators Handbook
- Author(s):
- Release date: October 2019
- Publisher(s): Ascent Audio
- ISBN: 9781469075228
You might also like
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond …
book
Practical Internet of Things Security - Second Edition
A practical, indispensable security guide that will navigate you through the complex realm of securely building …
book
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Know how to set up, defend, and attack computer networks with this revised and expanded second …