Authors: Peter Stephenson, Keith Gilbert
ISBN-13: 9780849322181, ISBN-10: 0849322189
Format: Hardcover
Publisher: Taylor & Francis, Inc.
Date Published: September 1999
Edition: 1st Edition
Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic techniques you need to preserve the security of your company's information.
Investigating Computer-Related Crime discusses the nature of cyber crime, its impact in the 21st century, its investigation and the difficulties encountered by both public law enforcement officials and private investigators. By detailing an investigation and providing helpful case studies, this book offers insights into collecting and preserving evidence, interrogating suspects and witnesses; handling the crime in progress, and issues in involving the authorities. The seasoned author offers valuable, firsthand information on using the forensic utilities for preserving evidence and searching for hidden information, to help you devise solutions to the computer-related crimes that threaten the well-being of your company.
Discusses the nature of cyber crime, its impact in the 21st century, its investigation, and difficulties encountered by both public law enforcement officials and private investigators. Offers a step-by-step approach to understanding and investigating security problems, technical and legal information, and computer forensic techniques, and gives advice on collecting and preserving evidence, interrogating suspects, handling crime in progress, and involving authorities. For corporate information professionals and investigators. The author has been a network consultant and lecturer for 18 years, specializing in information protection for large enterprises. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Sect. 1 | The Nature of Cyber Crime | |
Ch. 1 | Cyber Crime as We Enter the Twenty-First Century | 3 |
Ch. 2 | The Potential Impacts of Cyber Crime | 15 |
Ch. 3 | Rogue Code Attacks | 31 |
Ch. 4 | Surgical Strikes and Shotgun Blasts | 45 |
Sect. 2 | Investigating Cyber Crime | |
Ch. 5 | A Framework for Conducting an Investigation of a Computer Security Incident | 63 |
Ch. 6 | Look for the Hidden Flaw | 81 |
Ch. 7 | Analyzing the Remnants of a Computer Security Incident | 95 |
Ch. 8 | Launching the Investigation | 121 |
Ch. 9 | Determining If a Crime Has Taken Place | 149 |
Ch. 10 | Handling the Crime in Progress | 171 |
Ch. 11 | "It Never Happened" - Cover-Ups Are Common | 187 |
Ch. 12 | Involving the Authorities | 197 |
Ch. 13 | When an Investigation Can't Continue | 207 |
Sect. 3 | Preparing for Cyber Crime | |
Ch. 14 | Building a Corporate Cyber "SWAT Team" | 217 |
Ch. 15 | Privacy and Computer Crime | 235 |
Sect. 4 | Using the Forensic Utilities | |
Preface - How the Section Is Organized | 245 | |
Ch. 16 | Preserving Evidence - Basic Concepts | 247 |
Ch. 17 | Collecting Evidence - First Steps | 253 |
Ch. 18 | Searching for Hidden Information | 259 |
Ch. 19 | Handling Floppy Disks | 267 |
App. A | Introduction to Denial of Service Attacks | 269 |
App. B | Technical Report 540-96 | 285 |
Index | 293 |