Book description
This book covers the full life cycle of conducting a mobile and computer digital forensic examination, including planning and performing an investigation as well as report writing and testifying. Case reviews in corporate, civil, and criminal situations are also described from both prosecution and defense perspectives.
Digital Forensics Explained, Second Edition draws from years of experience in local, state, federal, and international environments and highlights the challenges inherent in deficient cyber security practices. Topics include the importance of following the scientific method and verification, legal and ethical issues, planning an investigation (including tools and techniques), incident response, case project management and authorization, social media and internet, cloud, anti-forensics, link and visual analysis, and psychological considerations.
The book is a valuable resource for the academic environment, law enforcement, those in the legal profession, and those working in the cyber security field. Case reviews include cyber security breaches, anti-forensic challenges, child exploitation, and social media investigations.
Greg Gogolin, PhD, CISSP, is a Professor of Information Security and Intelligence at Ferris State University and a licensed Professional Investigator. He has worked more than 100 cases in criminal, civil, and corporate environments.
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- Preface
- Acknowledgments
- Author
- Contributors
- 1 What is digital forensics, and what should you know about it?
- 2 Digital forensic approaches and best practices
- 3 Digital forensics tool kit
- 4 Internet and e-mail examinations
- 5 Mobile forensics
-
6 Cloud computing and digital forensics
- Introduction
- Infrastructure as a service
- Platform as a service
- Software as a service
- Service and deployment models
- Customer versus cloud provider responsibilities
- Other service models
- Multi-tenancy
- User access and provisioning
- Data protection and breaches
- Information technology and information security governance and change control processes
- Service access vulnerabilities
- Migration planning
- Incident response
- Virtualization
- Security benefits of cloud
- 7 Law enforcement incident response
- 8 Report writing and presentation
- 9 Social media forensics
- 10 Social engineering forensics
- 11 Anti-forensics
- 12 Link and visual analysis
- 13 Psychological, ethical, and cultural implications of digital forensics
- 14 Someone is watching
-
15 The realities of digital forensic practice
- Introduction
- The case – taking a look
- Case #1 – things are not what they seem
- Case #2 – things are not what they seem
- Working a criminal case
- Case #3 – conducting a thorough investigation
- Case #4 – conducting a thorough investigation
- Working a civil case
- Things to keep in mind during any investigation
- Summary
- Index
Product information
- Title: Digital Forensics Explained, 2nd Edition
- Author(s):
- Release date: April 2021
- Publisher(s): CRC Press
- ISBN: 9781000350708
You might also like
book
Digital Forensics Explained
The field of computer forensics has experienced significant growth recently and those looking to get into …
book
Digital Forensics
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, …
book
Digital Forensics
The definitive text for students of digital forensics, as well as professionals looking to deepen their …
book
Digital Forensics and Internet of Things
DIGITAL FORENSICS AND INTERNET OF THINGS It pays to be ahead of the criminal, and this …