O'Reilly logo

Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, First Edition by Aamir Lakhani, Joseph Muniz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

Cybercrime and Defenses

“Know thy self, know thy enemy. A thousand battles, a thousand victories.”

—Sun Tzu

There are many types of crime. When technology is involved, typically computer forensics is engaged to scope, contain, and remediate the threat as well as understand everything from how the attack happened to its impact to the organization. Computer forensics can investigate web resources and user systems such as phones, computers, or anything in between as long as it contains digital data. The growing number of devices obtaining IP capabilities that Cisco terms “the Internet of Everything (IoE)” increases the challenges for organizations to implement proper defenses. You will often hear terms such as IoT (Internet of Things), ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required