Chapter 2

Cybercrime and Defenses

“Know thy self, know thy enemy. A thousand battles, a thousand victories.”

—Sun Tzu

There are many types of crime. When technology is involved, typically computer forensics is engaged to scope, contain, and remediate the threat as well as understand everything from how the attack happened to its impact to the organization. Computer forensics can investigate web resources and user systems such as phones, computers, or anything in between as long as it contains digital data. The growing number of devices obtaining IP capabilities that Cisco terms “the Internet of Everything (IoE)” increases the challenges for organizations to implement proper defenses. You will often hear terms such as IoT (Internet of Things), ...

Get Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, First Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.