CyberForensics Understanding Information Security Investigations

This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics

  • PDF / 6,732,677 Bytes
  • 170 Pages / 547.087 x 737.008 pts Page_size
  • 46 Downloads / 235 Views

DOWNLOAD

REPORT


Series Editor Ashraf Mozayani, Ph.D.

For other titles published in this series, go to http://www.springer.com/series/8401

Jennifer Bayuk Editor

CyberForensics Understanding Information Security Investigations

Foreword by Amit Yoran

Editor Jennifer Bayuk Cybersecurity Program Director School of Systems and Engineering Stevens Institute of Technology Castle Point on Hudson 518 Babbio Center Hoboken, NJ 07030, USA [email protected]

ISBN 978-1-60761-771-6 e-ISBN 978-1-60761-772-3 DOI 10.1007/978-1-60761-772-3 Springer New York Dordrecht Heidelberg London Library of Congress Control Number: 2010931676 © Springer Science+Business Media, LLC 2010 All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Humana Press, c/o Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of going to press, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper Humana Press is part of Springer Science+Business Media (www.springer.com)

Contents

1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jennifer Bayuk

1

2 The Complex World of Corporate CyberForensics Investigations . . Gregory Leibolt

7

3 Investigating Large-Scale Data Breach Cases . . . . . . . . . . . . . J. Andrew Valentine

29

4 Insider Threat Investigations . . . . . . . . . . . . . . . . . . . . . . Shane Sims

45

5 Accounting Forensics . . . . . . . . . . . . . . . . . . . . . . . . . . . Tracy McBride

53

6 Analyzing Malicious Software . . . . . . . . . . . . . . . . . . . . . . Lenny Zeltser

59

7 Network Packet Forensics . . . . . . . . . . . . . . . . . . . . . . . . Eddie Schwartz

85

8 RAM and File Systems Investigations . . . . . . . . . . . . . . . . . . Rita M. Barrios and Yuri Signori

103

9 One Picture is Worth a Million Bytes . . . . . . . . . . . . . . . . . . Don Fergus and Anthony Agresta

117

10 Cybercrime and Law Enforcement Cooperation . . . . . . . . . . . . Art Ehuan

129

11 Technology Malpractice . . . . . . . . . . . . . . . . . . . . . . . . . Paul Rohmeyer

141

Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

149

Index . . . . . . . . . . . . . . . . . . . . . . .