Digital Forensics Explained, 2nd Edition

Book description

This book covers the full life cycle of conducting a mobile and computer digital forensic examination, including planning and performing an investigation as well as report writing and testifying. Case reviews in corporate, civil, and criminal situations are also described from both prosecution and defense perspectives.

Digital Forensics Explained, Second Edition draws from years of experience in local, state, federal, and international environments and highlights the challenges inherent in deficient cyber security practices. Topics include the importance of following the scientific method and verification, legal and ethical issues, planning an investigation (including tools and techniques), incident response, case project management and authorization, social media and internet, cloud, anti-forensics, link and visual analysis, and psychological considerations.

The book is a valuable resource for the academic environment, law enforcement, those in the legal profession, and those working in the cyber security field. Case reviews include cyber security breaches, anti-forensic challenges, child exploitation, and social media investigations.

 

Greg Gogolin, PhD, CISSP, is a Professor of Information Security and Intelligence at Ferris State University and a licensed Professional Investigator. He has worked more than 100 cases in criminal, civil, and corporate environments.

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Table of Contents
  6. Preface
  7. Acknowledgments
  8. Author
  9. Contributors
  10. 1 What is digital forensics, and what should you know about it?
    1. Introduction
    2. Forensic science
      1. What does it take to be a digital forensic investigator?
    3. Educational opportunities
      1. What opportunities are there for digital forensic investigators?
      2. What are the trends and challenges in digital forensics?
      3. Resources available to digital forensic investigators
    4. Conclusion
    5. References
  11. 2 Digital forensic approaches and best practices
    1. Introduction
    2. First response
    3. Responding to a case
    4. Conclusion
    5. References
    6. Other useful resources
  12. 3 Digital forensics tool kit
    1. Introduction
    2. Computer forensics
    3. Write blockers
    4. Imaging
    5. Add-ons and other technologies
    6. Tools
    7. Mobile forensics tools
    8. Visual analysis
    9. Secured storage
    10. Damaged media
    11. Summary
    12. References
  13. 4 Internet and e-mail examinations
    1. Introduction
    2. E-mail
    3. Chat and messaging logs
    4. Peer-to-peer
    5. Search engine activity
    6. Internet history
    7. Social networking and gaming
    8. Malware and viruses
    9. Summary
  14. 5 Mobile forensics
    1. Introduction
    2. Mobile phone technology
    3. How a call is made
    4. Forensic challenges
    5. Forensic process
    6. Digital cell phone investigation
    7. Geographic positioning systems
    8. Cameras
    9. Common extraction types
    10. Information sources and location information
    11. Summary
    12. Cellular communications technology overview
    13. References
  15. 6 Cloud computing and digital forensics
    1. Introduction
    2. Infrastructure as a service
    3. Platform as a service
    4. Software as a service
    5. Service and deployment models
    6. Customer versus cloud provider responsibilities
    7. Other service models
    8. Multi-tenancy
    9. User access and provisioning
    10. Data protection and breaches
    11. Information technology and information security governance and change control processes
    12. Service access vulnerabilities
    13. Migration planning
    14. Incident response
    15. Virtualization
    16. Security benefits of cloud
  16. 7 Law enforcement incident response
    1. Introduction
    2. Case summary
    3. The initiation of an investigation
    4. Information
    5. Evidence gathering
    6. Interviews and the analysis of evidence
    7. Analysis of the electronic evidence
    8. Prosecution and testimony
    9. Things to consider
    10. Conclusion
  17. 8 Report writing and presentation
    1. Introduction
    2. Report content and considerations
    3. Sample reports
    4. Presenting and testifying
    5. Dr. Otting’s thoughts on criminal case testimony
    6. Archiving
    7. Summary
  18. 9 Social media forensics
    1. Introduction
    2. Introduction to social media
      1. Social networking
      2. Micro blogs
      3. Multimedia sharing
      4. Instant messaging and communication
      5. Blogs
      6. Event coordination
      7. Location identification
      8. Search
      9. Wikis
      10. Web conferencing
      11. Virtual worlds
      12. Social media forensics
      13. Street gangs
      14. Terrorist activity
      15. White collar crimes
    3. Summary
    4. References
  19. 10 Social engineering forensics
    1. Introduction
      1. Introduction to social engineering
    2. Online social engineering attacks
    3. Telephone social engineering attacks
    4. Waste management social engineering attacks
    5. Mobile device social engineering attacks
    6. Personal social engineering attacks
    7. Reverse social engineering attacks
      1. Social engineering forensics
    8. Summary
    9. References
  20. 11 Anti-forensics
    1. Anti-forensic definition and concepts
    2. Anti-forensic methods
    3. Eliminate trails
    4. Hide evidence
    5. Destroy evidence
    6. Mobile anti-forensics
    7. Conclusion
    8. References
  21. 12 Link and visual analysis
    1. Introduction
    2. Link and visual analysis
    3. Conclusion
  22. 13 Psychological, ethical, and cultural implications of digital forensics
    1. Introduction
    2. Psychological implications of digital forensics
    3. Prospective from the career in law enforcement of Dr. Otting
    4. Ethical implications of digital forensics
    5. Cultural implications of digital forensics
    6. Conclusion
    7. References
  23. 14 Someone is watching
    1. Introduction
    2. Case summary
    3. Evidence gathering
    4. Analysis of evidence
    5. Summary
  24. 15 The realities of digital forensic practice
    1. Introduction
    2. The case – taking a look
    3. Case #1 – things are not what they seem
    4. Case #2 – things are not what they seem
    5. Working a criminal case
    6. Case #3 – conducting a thorough investigation
    7. Case #4 – conducting a thorough investigation
    8. Working a civil case
    9. Things to keep in mind during any investigation
    10. Summary
  25. Index

Product information

  • Title: Digital Forensics Explained, 2nd Edition
  • Author(s): Greg Gogolin
  • Release date: April 2021
  • Publisher(s): CRC Press
  • ISBN: 9781000350708