E-Book, Englisch, 400 Seiten, Web PDF
Wiles TechnoSecurity's Guide to E-Discovery and Digital Forensics
1. Auflage 2011
ISBN: 978-0-08-055881-3
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
A Comprehensive Handbook
E-Book, Englisch, 400 Seiten, Web PDF
ISBN: 978-0-08-055881-3
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.
IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world.
The TechnoSecurity Guide to Digital Forensics and E-Discovery features:
* Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics
* Bonus chapters on how to build your own Forensics Lab
* 50% discount to the upcoming Techno Forensics conference for everyone
who purchases a book
Autoren/Hrsg.
Weitere Infos & Material
1;Cover;1
2;Contents;15
3;Foreword;27
4;Chapter 1: Authentication: Are You Investigating the Right Person?;29
4.1;Introduction;30
4.2;Authentication: What Is It?;30
4.3;An Authentication War Story from 20 Years Ago: The Outside Job;33
4.4;A Second Authentication War Story;35
4.5;Let’s Do Something about This Authentication Problem;37
4.6;A Third Authentication War Story;39
4.7;Security Threats in the Future;41
4.8;The Inside Job;42
4.9;A Final Authentication War Story;43
4.10;Key Loggers 101;49
4.11;Some 21st Century Solutions to Authentication;51
4.12;Security Awareness Training;52
4.13;The Rest of the Book;53
5;Chapter 2: Digital Forensics: An Overview;61
5.1;Introduction;62
5.2;Digital Forensic Principles;62
5.3;Digital Environments;71
5.4;Digital Forensic Methodologies;73
6;Chapter 3: Working with Other Agencies;93
6.1;Introduction;94
6.2;Building the Relationship;96
6.3;Building Your Package of Information;98
6.4;Don’t Shop Your Cases;101
6.5;A Discussion of Agencies;102
6.6;The Big Two: The U.S. Secret Service and the FBI;103
6.7;Other Federal Cyber Crime Investigations Agencies;118
7;Chapter 4: Developing an Enterprise Digital Investigative/ Electronic Discovery Capability;123
7.1;Introduction;124
7.2;Identifying Requirements for an Enterprise Digital Investigative/ Electronic Discovery Capability;125
7.3;Administrative Considerations for an Enterprise Digital Investigative/Electronic Discovery Capability;131
7.4;Identifying Resources (Software/Hardware/Facility) for Your Team;145
8;Chapter 5: Forensic Examination in a Terabyte World;157
8.1;Introduction;158
8.2;Volume Challenges;158
8.3;Network and Hardware Challenges;161
8.4;Future Digital Forensic Solutions;162
8.5;The FTK 2.x Model;168
9;Chapter 6: Selecting Equipment for a Computer Forensic Laboratory;175
9.1;Introduction;176
9.2;Forensic Workstations for the Laboratory;176
9.3;Forensic Workstations for the Mobile or Field Laboratory;186
9.4;Hardware Write-Protection Devices;188
9.5;Data Storage;194
9.6;Miscellaneous Items;195
10;Chapter 7: Integrating a Quality Management System in a Digital Forensic Laboratory;203
10.1;Introduction;204
10.2;Quality Planning, Quality Reviews, and Continuous Quality Improvement;205
10.3;Other Challenges: Ownership, Responsibility, and Authority;223
11;Chapter 8: Balancing E-discovery Challenges with Legal and IT Requirements;235
11.1;Introduction;236
11.2;Drivers of E-discovery Engineering;236
11.3;Locations, Forms, and Preservation of Electronically Stored Information;240
11.4;Legal and IT Team Considerations for Electronic Discovery;244
11.5;Are You Litigation Ready?;250
11.6;E-discovery Tools;260
12;Chapter 9: E-mail Forensics;265
12.1;Introduction;266
12.2;Where to Start;266
12.3;Forensic Acquisition;274
12.4;Processing Local Mail Archives;275
13;Chapter 10: Murder and Money: The Story of Standards, Accreditation, and Certification in Computer Forensics;289
13.1;Introduction;290
13.2;Standards;290
13.3;Accreditation;291
13.4;Certification;291
13.5;Rough Beginnings;292
13.6;Money to the Rescue;294
13.7;Standards and Computer Forensics;294
13.8;Certification Options for the Digital Evidence Analyst;298
13.9;Another Standards Option;299
14;Chapter 11: Starting a Career in the Field of Techno Forensics;305
14.1;Introduction;306
14.2;Occupations;306
14.3;Professional Organizations;308
14.4;Professional Certifications;309
14.5;Degree Programs;316
15;Appendix A: Death by a Thousand Cuts By Johnny Long with Anthony Kokocinski;343
16;Appendix B: Credibility Is Believability— Success in the Courtroom;397
16.1;Introduction;398
16.2;First Impressions;398
16.3;Appearance;399
16.4;Body Language;407
16.5;Speech;415
17;Index;423