CyberForensics Understanding Information Security Investigations
This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics
- PDF / 6,732,677 Bytes
- 170 Pages / 547.087 x 737.008 pts Page_size
- 46 Downloads / 269 Views
		    Series Editor Ashraf Mozayani, Ph.D.
 
 For other titles published in this series, go to http://www.springer.com/series/8401
 
 Jennifer Bayuk Editor
 
 CyberForensics Understanding Information Security Investigations
 
 Foreword by Amit Yoran
 
 Editor Jennifer Bayuk Cybersecurity Program Director School of Systems and Engineering Stevens Institute of Technology Castle Point on Hudson 518 Babbio Center Hoboken, NJ 07030, USA [email protected]
 
 ISBN 978-1-60761-771-6 e-ISBN 978-1-60761-772-3 DOI 10.1007/978-1-60761-772-3 Springer New York Dordrecht Heidelberg London Library of Congress Control Number: 2010931676 © Springer Science+Business Media, LLC 2010 All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Humana Press, c/o Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of going to press, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper Humana Press is part of Springer Science+Business Media (www.springer.com)
 
 Contents
 
 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jennifer Bayuk
 
 1
 
 2 The Complex World of Corporate CyberForensics Investigations . . Gregory Leibolt
 
 7
 
 3 Investigating Large-Scale Data Breach Cases . . . . . . . . . . . . . J. Andrew Valentine
 
 29
 
 4 Insider Threat Investigations . . . . . . . . . . . . . . . . . . . . . . Shane Sims
 
 45
 
 5 Accounting Forensics . . . . . . . . . . . . . . . . . . . . . . . . . . . Tracy McBride
 
 53
 
 6 Analyzing Malicious Software . . . . . . . . . . . . . . . . . . . . . . Lenny Zeltser
 
 59
 
 7 Network Packet Forensics . . . . . . . . . . . . . . . . . . . . . . . . Eddie Schwartz
 
 85
 
 8 RAM and File Systems Investigations . . . . . . . . . . . . . . . . . . Rita M. Barrios and Yuri Signori
 
 103
 
 9 One Picture is Worth a Million Bytes . . . . . . . . . . . . . . . . . . Don Fergus and Anthony Agresta
 
 117
 
 10 Cybercrime and Law Enforcement Cooperation . . . . . . . . . . . . Art Ehuan
 
 129
 
 11 Technology Malpractice . . . . . . . . . . . . . . . . . . . . . . . . . Paul Rohmeyer
 
 141
 
 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
 
 149
 
 Index . . . . . . . . . . . . . . . . . . . . . . .		
Data Loading...
 
	 
	 
	 
	 
	 
	 
	 
	 
	 
	 
	