Cyber Crime Investigations : Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors.

By: Reyes, AnthonyContributor(s): Brittson, Richard | O'Shea, Kevin | Steele, JamesPublisher: Burlington : Elsevier Science & Technology Books, 2007Copyright date: ©2007Description: 1 online resource (433 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9780080553634Subject(s): Computer crimes -- InvestigationGenre/Form: Electronic books. Additional physical formats: Print version:: Cyber Crime Investigations : Bridging the Gaps Between Security Professionals, Law Enforcement, and ProsecutorsDDC classification: 363.25968 LOC classification: HV8079.C65R49 2007Online resources: Click to View
Contents:
Front Cover -- Cyber Crime Investigations: Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors -- Copyright Page -- Contents -- Chapter 1. The Problem at Hand -- Introduction -- The Gaps in Cyber Crime Law -- Unveiling the Myths Behind Cyber Crime -- Prioritizing Evidence -- Setting the Bar Too High -- Summary -- Works Referenced -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. "Computer Crime" Discussed -- Introduction -- Examining "Computer Crime" Definitions -- Dissecting "Computer Crime" -- Using Clear Language to Bridge the Gaps -- Summary -- Works Referenced -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Preparing for Prosecution and Testifying -- Introduction -- Common Misconceptions -- Chain of Custody -- Keys to Effective Testimony -- Differences between Civil and Criminal Cases -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Cyber Investigative Roles -- Introduction -- Understanding Your Role as a Cyber Crime Investigator -- The Role of Law Enforcement Officers -- The Role of the Prosecuting Attorney -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Works Referenced -- Chapter 5. Incident Response: Live Forensics and Investigations -- Introduction -- Postmortmem versus Live Forensics -- Today's Live Methods -- Case Study: Live versus Postmortem -- Computer Analysis for the Hacker Defender Program -- Network Analysis -- Summary -- Special Thanks -- References -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Legal Issues of Intercepting WiFi Transmissions -- Introduction -- WiFi Technology -- Understanding WiFi RF -- Scanning RF -- Eavesdropping on WiFi -- Fourth Amendment Expectation of Privacy in WLANs -- Summary -- Works Cited -- Solutions Fast Track -- Frequently Asked Questions.
Chapter 7. Seizure of Digital Information -- Introduction -- Defining Digital Evidence -- Digital Evidence Seizure Methodology -- Factors Limiting the Wholesale Seizure of Hardware -- Other Options for Seizing Digital Evidence -- Common Threads within Digital Evidence Seizure -- Determining the Most Appropriate Seizure Method -- Summary -- Works Cited -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Conducting Cyber Investigations -- Introduction -- Demystifying Computer/Cyber Crime -- Understanding IP Addresses -- The Explosion of Networking -- The Explosion of Wireless Networks -- Interpersonal Communication -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Digital Forensics and Analyzing Data -- Introduction -- The Evolution of Computer Forensics -- Phases of Digital Forensics -- Summary -- References -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Cyber Crime Prevention -- Introduction -- Ways to Prevent Cyber Crime Targeted at You -- Ways to Prevent Cyber Crime Targeted at the Family -- Ways to Prevent Cyber Crime Targeted at Personal Property -- Ways to Prevent Cyber Crime Targeted at a Business -- Ways to Prevent Cyber Crime Targeted at an Organization -- Ways to Prevent Cyber Crime Targeted at a Government Agency -- Summary -- Notes -- Solutions Fast Track -- Frequently Asked Questions -- Appendix A: Legal Principles for Information Security Evaluations -- Introduction -- Uncle Sam Wants You: How Your Company's Information Security Can Affect U.S. National Security (and Vice Versa) -- Legal Standards Relevant to Information Security -- Do It Right or Bet the Company:Tools to Mitigate Legal Liability -- What to Cover in Security Evaluation Contracts -- The First Thing We Do…? Why You Want Your Lawyers Involved from Start to Finish -- Solutions Fast Track.
Frequently Asked Questions -- References -- Appendix B: Investigating Insider Threat Using Enterprise Security Management. -- What Is ESM? -- What Is a Chinese Wall? -- Data Sources -- Bridging the Chinese Wall: Detection through Convergence -- Conclusion -- Index.
Summary: The Only Book on Cyber Crime for Incident Handlers, First Responders, Police Investigators and Prosecutors!.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Ebrary Ebrary Afghanistan
Available EBKAF00020498
Ebrary Ebrary Algeria
Available
Ebrary Ebrary Cyprus
Available
Ebrary Ebrary Egypt
Available
Ebrary Ebrary Libya
Available
Ebrary Ebrary Morocco
Available
Ebrary Ebrary Nepal
Available EBKNP00020498
Ebrary Ebrary Sudan

Access a wide range of magazines and books using Pressreader and Ebook central.

Enjoy your reading, British Council Sudan.

Available
Ebrary Ebrary Tunisia
Available
Total holds: 0

Front Cover -- Cyber Crime Investigations: Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors -- Copyright Page -- Contents -- Chapter 1. The Problem at Hand -- Introduction -- The Gaps in Cyber Crime Law -- Unveiling the Myths Behind Cyber Crime -- Prioritizing Evidence -- Setting the Bar Too High -- Summary -- Works Referenced -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. "Computer Crime" Discussed -- Introduction -- Examining "Computer Crime" Definitions -- Dissecting "Computer Crime" -- Using Clear Language to Bridge the Gaps -- Summary -- Works Referenced -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Preparing for Prosecution and Testifying -- Introduction -- Common Misconceptions -- Chain of Custody -- Keys to Effective Testimony -- Differences between Civil and Criminal Cases -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4. Cyber Investigative Roles -- Introduction -- Understanding Your Role as a Cyber Crime Investigator -- The Role of Law Enforcement Officers -- The Role of the Prosecuting Attorney -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Works Referenced -- Chapter 5. Incident Response: Live Forensics and Investigations -- Introduction -- Postmortmem versus Live Forensics -- Today's Live Methods -- Case Study: Live versus Postmortem -- Computer Analysis for the Hacker Defender Program -- Network Analysis -- Summary -- Special Thanks -- References -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6. Legal Issues of Intercepting WiFi Transmissions -- Introduction -- WiFi Technology -- Understanding WiFi RF -- Scanning RF -- Eavesdropping on WiFi -- Fourth Amendment Expectation of Privacy in WLANs -- Summary -- Works Cited -- Solutions Fast Track -- Frequently Asked Questions.

Chapter 7. Seizure of Digital Information -- Introduction -- Defining Digital Evidence -- Digital Evidence Seizure Methodology -- Factors Limiting the Wholesale Seizure of Hardware -- Other Options for Seizing Digital Evidence -- Common Threads within Digital Evidence Seizure -- Determining the Most Appropriate Seizure Method -- Summary -- Works Cited -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8. Conducting Cyber Investigations -- Introduction -- Demystifying Computer/Cyber Crime -- Understanding IP Addresses -- The Explosion of Networking -- The Explosion of Wireless Networks -- Interpersonal Communication -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9. Digital Forensics and Analyzing Data -- Introduction -- The Evolution of Computer Forensics -- Phases of Digital Forensics -- Summary -- References -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 10. Cyber Crime Prevention -- Introduction -- Ways to Prevent Cyber Crime Targeted at You -- Ways to Prevent Cyber Crime Targeted at the Family -- Ways to Prevent Cyber Crime Targeted at Personal Property -- Ways to Prevent Cyber Crime Targeted at a Business -- Ways to Prevent Cyber Crime Targeted at an Organization -- Ways to Prevent Cyber Crime Targeted at a Government Agency -- Summary -- Notes -- Solutions Fast Track -- Frequently Asked Questions -- Appendix A: Legal Principles for Information Security Evaluations -- Introduction -- Uncle Sam Wants You: How Your Company's Information Security Can Affect U.S. National Security (and Vice Versa) -- Legal Standards Relevant to Information Security -- Do It Right or Bet the Company:Tools to Mitigate Legal Liability -- What to Cover in Security Evaluation Contracts -- The First Thing We Do…? Why You Want Your Lawyers Involved from Start to Finish -- Solutions Fast Track.

Frequently Asked Questions -- References -- Appendix B: Investigating Insider Threat Using Enterprise Security Management. -- What Is ESM? -- What Is a Chinese Wall? -- Data Sources -- Bridging the Chinese Wall: Detection through Convergence -- Conclusion -- Index.

The Only Book on Cyber Crime for Incident Handlers, First Responders, Police Investigators and Prosecutors!.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.