Digital Forensics : threatscape and best practices / [electronic resource]
by Sammons, John [author.].
Material type: BookPublisher: Waltham, MA : Syngress is an imprint of Elsevier, 2016.Description: 1 online resource.ISBN: 0128045426; 9780128045428.Subject(s): Computer crimes -- Investigation | BUSINESS & ECONOMICS -- Infrastructure | SOCIAL SCIENCE -- General | Computer crimes -- Investigation | Criminology, Penology & Juvenile Delinquency | Social Welfare & Social Work | Social Sciences | Electronic booksOnline resources: ScienceDirectOnline resource; title from digital title page (viewed on January 08, 2016).
Includes bibliographical references and indexes.
This book surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. You will learn the basics of cryptocurrencies (like Bitcoin) and the artifacts they generate; discover why examination planning matters and how to do it effectively; incorporate behaviorial analysis into your digital forensics examinations; stay updated with the key artifacts created by the latest Mac OS, OS X 10.11, El Capitan. It discusses the threatscapes and challenges facing mobile device forensics, law enforcement, and legal cases; the power of applying electronic discovery workflows to digital forensics; shows the value of and impact of social media forensics. -- Edited summary from book.
Cover; Title Page; Copyright Page; Dedication; Contents; List of Contributors; Editor Biography; Biographies; Acknowledgments; Chapter 1 -- The cryptocurrency enigma; Purpose; Introduction; What makes a currency?; Cryptocurrency; Public key encryption basics; Forensic relevance; Bitcoin; History and current context; Bitcoin framework; Blockchain; Wallets and addresses; Transaction; Verification; Mining; Blockchain explorers; Bitcoin protocol; Forensic artifacts; Multibit HD; Blockchain transaction details; Multibit log; The bitcoin protocol in action; Inv packet; Inv packet data.
Getdata packetGetdata packet data; TX packet; TX packet data; Summary; References; Chapter 2 -- The key to forensic success: examination planning is a key determinant of efficient and effective digital forensics; Introduction; The four phases of digital forensics; It is a matter of questions; Investigative questions; Legal questions; Forensic questions; Identification; Classification/individualization; Association; Reconstruction; Forensic questions as a bridge; Developing forensic hypotheses; Knowing how far to go; Starting the plan; How do you know when you are done?
Examination phase -- data extractionThe forensic analysis; The examination planning process; Conclusion; Examination Planning References; Chapter 3 -- Psychological profiling as an investigative tool for digital forensics; Current model; Issues; Volume of data; Lack of context; Accountability; New model; Phases; Classification; Context analysis; Collection; Statistical analysis; Timeline analysis/visualization; Decision/opinion; Limitations; Case studies; Case study 1 -- shaken baby death; Case study 2 -- arson homicide; Case study 3 -- possession of child porn; Conclusions; References.
Chapter 4 -- The intersection between social media, crime, and digital forensics: #WhoDunIt?Introduction; Social media and crime; Social media and digital forensics; Social media evidence on the network; Social media evidence on the physical device; Summary; References; Chapter 5 -- Mobile device forensics: threats, challenges, and future trends; Introduction; The hardware versus software complexity trend; Cloud services and mobile platforms -- inherent vulnerabilities; There is an app for that -- forensic challenges and threats within apps; Social media apps; Native and non-native messaging apps.
Multimedia and VoIP "streaming" appsCloud-based storage apps; Camera-enabled apps; Location data and apps; Geotagging and EXIF data within apps; Persistent threats and challenges -- what lies ahead for mobile device forensics; Data encryption and stronger passwords; "Burner" and Chinese phones; JTAG and Chipoff analysis -- advantages, challenges, and threats; Validation and best practices of mobile forensic tools and methods -- the forensic enigma; Conclusion; References; Chapter 6 -- Digital forensics in an eDiscovery world; Introduction; eDiscovery processes and EDRM; Cat or dog not mouse.
There are no comments for this item.