You are not signed in. Sign in.

List Books: Buy books on ListBooks.org

Investigating Computer- Related Crime a Handbook for Corporate Investigators » (1st Edition)

Book cover image of Investigating Computer- Related Crime a Handbook for Corporate Investigators by Peter Stephenson

Authors: Peter Stephenson, Keith Gilbert
ISBN-13: 9780849322181, ISBN-10: 0849322189
Format: Hardcover
Publisher: Taylor & Francis, Inc.
Date Published: September 1999
Edition: 1st Edition

Find Best Prices for This Book »

Author Biography: Peter Stephenson

Book Synopsis

Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic techniques you need to preserve the security of your company's information.

Investigating Computer-Related Crime discusses the nature of cyber crime, its impact in the 21st century, its investigation and the difficulties encountered by both public law enforcement officials and private investigators. By detailing an investigation and providing helpful case studies, this book offers insights into collecting and preserving evidence, interrogating suspects and witnesses; handling the crime in progress, and issues in involving the authorities. The seasoned author offers valuable, firsthand information on using the forensic utilities for preserving evidence and searching for hidden information, to help you devise solutions to the computer-related crimes that threaten the well-being of your company.

Booknews

Discusses the nature of cyber crime, its impact in the 21st century, its investigation, and difficulties encountered by both public law enforcement officials and private investigators. Offers a step-by-step approach to understanding and investigating security problems, technical and legal information, and computer forensic techniques, and gives advice on collecting and preserving evidence, interrogating suspects, handling crime in progress, and involving authorities. For corporate information professionals and investigators. The author has been a network consultant and lecturer for 18 years, specializing in information protection for large enterprises. Annotation c. Book News, Inc., Portland, OR (booknews.com)

Table of Contents

Sect. 1The Nature of Cyber Crime
Ch. 1Cyber Crime as We Enter the Twenty-First Century3
Ch. 2The Potential Impacts of Cyber Crime15
Ch. 3Rogue Code Attacks31
Ch. 4Surgical Strikes and Shotgun Blasts45
Sect. 2Investigating Cyber Crime
Ch. 5A Framework for Conducting an Investigation of a Computer Security Incident63
Ch. 6Look for the Hidden Flaw81
Ch. 7Analyzing the Remnants of a Computer Security Incident95
Ch. 8Launching the Investigation121
Ch. 9Determining If a Crime Has Taken Place149
Ch. 10Handling the Crime in Progress171
Ch. 11"It Never Happened" - Cover-Ups Are Common187
Ch. 12Involving the Authorities197
Ch. 13When an Investigation Can't Continue207
Sect. 3Preparing for Cyber Crime
Ch. 14Building a Corporate Cyber "SWAT Team"217
Ch. 15Privacy and Computer Crime235
Sect. 4Using the Forensic Utilities
Preface - How the Section Is Organized245
Ch. 16Preserving Evidence - Basic Concepts247
Ch. 17Collecting Evidence - First Steps253
Ch. 18Searching for Hidden Information259
Ch. 19Handling Floppy Disks267
App. AIntroduction to Denial of Service Attacks269
App. BTechnical Report 540-96285
Index293

Subjects