Coverart for item
The Resource Digital Forensics : threatscape and best practices, edited by John Sammons

Digital Forensics : threatscape and best practices, edited by John Sammons

Label
Digital Forensics : threatscape and best practices
Title
Digital Forensics
Title remainder
threatscape and best practices
Statement of responsibility
edited by John Sammons
Creator
Author
Subject
Language
eng
Summary
This book surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. You will learn the basics of cryptocurrencies (like Bitcoin) and the artifacts they generate; discover why examination planning matters and how to do it effectively; incorporate behaviorial analysis into your digital forensics examinations; stay updated with the key artifacts created by the latest Mac OS, OS X 10.11, El Capitan. It discusses the threatscapes and challenges facing mobile device forensics, law enforcement, and legal cases; the power of applying electronic discovery workflows to digital forensics; shows the value of and impact of social media forensics. --
Assigning source
Edited summary from book
Cataloging source
YDXCP
http://library.link/vocab/creatorName
Sammons, John
Dewey number
363.25/968
Index
index present
LC call number
HV8079.C65
LC item number
S35 2016
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/subjectName
  • Computer crimes
  • BUSINESS & ECONOMICS
  • SOCIAL SCIENCE
  • Computer crimes
Label
Digital Forensics : threatscape and best practices, edited by John Sammons
Instantiates
Publication
Bibliography note
Includes bibliographical references and indexes
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover; Title Page; Copyright Page; Dedication; Contents; List of Contributors; Editor Biography; Biographies; Acknowledgments; Chapter 1 -- The cryptocurrency enigma; Purpose; Introduction; What makes a currency?; Cryptocurrency; Public key encryption basics; Forensic relevance; Bitcoin; History and current context; Bitcoin framework; Blockchain; Wallets and addresses; Transaction; Verification; Mining; Blockchain explorers; Bitcoin protocol; Forensic artifacts; Multibit HD; Blockchain transaction details; Multibit log; The bitcoin protocol in action; Inv packet; Inv packet data
  • Getdata packetGetdata packet data; TX packet; TX packet data; Summary; References; Chapter 2 -- The key to forensic success: examination planning is a key determinant of efficient and effective digital forensics; Introduction; The four phases of digital forensics; It is a matter of questions; Investigative questions; Legal questions; Forensic questions; Identification; Classification/individualization; Association; Reconstruction; Forensic questions as a bridge; Developing forensic hypotheses; Knowing how far to go; Starting the plan; How do you know when you are done?
  • Examination phase -- data extractionThe forensic analysis; The examination planning process; Conclusion; Examination Planning References; Chapter 3 -- Psychological profiling as an investigative tool for digital forensics; Current model; Issues; Volume of data; Lack of context; Accountability; New model; Phases; Classification; Context analysis; Collection; Statistical analysis; Timeline analysis/visualization; Decision/opinion; Limitations; Case studies; Case study 1 -- shaken baby death; Case study 2 -- arson homicide; Case study 3 -- possession of child porn; Conclusions; References
  • Chapter 4 -- The intersection between social media, crime, and digital forensics: #WhoDunIt?Introduction; Social media and crime; Social media and digital forensics; Social media evidence on the network; Social media evidence on the physical device; Summary; References; Chapter 5 -- Mobile device forensics: threats, challenges, and future trends; Introduction; The hardware versus software complexity trend; Cloud services and mobile platforms -- inherent vulnerabilities; There is an app for that -- forensic challenges and threats within apps; Social media apps; Native and non-native messaging apps
  • Multimedia and VoIP "streaming" appsCloud-based storage apps; Camera-enabled apps; Location data and apps; Geotagging and EXIF data within apps; Persistent threats and challenges -- what lies ahead for mobile device forensics; Data encryption and stronger passwords; "Burner" and Chinese phones; JTAG and Chipoff analysis -- advantages, challenges, and threats; Validation and best practices of mobile forensic tools and methods -- the forensic enigma; Conclusion; References; Chapter 6 -- Digital forensics in an eDiscovery world; Introduction; eDiscovery processes and EDRM; Cat or dog not mouse
Control code
934476226
Dimensions
unknown
Extent
1 online resource
Form of item
online
Isbn
9780128045428
Media category
computer
Media MARC source
rdamedia
Media type code
c
http://library.link/vocab/ext/overdrive/overdriveId
878827
Specific material designation
remote
System control number
(OCoLC)934476226
Label
Digital Forensics : threatscape and best practices, edited by John Sammons
Publication
Bibliography note
Includes bibliographical references and indexes
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover; Title Page; Copyright Page; Dedication; Contents; List of Contributors; Editor Biography; Biographies; Acknowledgments; Chapter 1 -- The cryptocurrency enigma; Purpose; Introduction; What makes a currency?; Cryptocurrency; Public key encryption basics; Forensic relevance; Bitcoin; History and current context; Bitcoin framework; Blockchain; Wallets and addresses; Transaction; Verification; Mining; Blockchain explorers; Bitcoin protocol; Forensic artifacts; Multibit HD; Blockchain transaction details; Multibit log; The bitcoin protocol in action; Inv packet; Inv packet data
  • Getdata packetGetdata packet data; TX packet; TX packet data; Summary; References; Chapter 2 -- The key to forensic success: examination planning is a key determinant of efficient and effective digital forensics; Introduction; The four phases of digital forensics; It is a matter of questions; Investigative questions; Legal questions; Forensic questions; Identification; Classification/individualization; Association; Reconstruction; Forensic questions as a bridge; Developing forensic hypotheses; Knowing how far to go; Starting the plan; How do you know when you are done?
  • Examination phase -- data extractionThe forensic analysis; The examination planning process; Conclusion; Examination Planning References; Chapter 3 -- Psychological profiling as an investigative tool for digital forensics; Current model; Issues; Volume of data; Lack of context; Accountability; New model; Phases; Classification; Context analysis; Collection; Statistical analysis; Timeline analysis/visualization; Decision/opinion; Limitations; Case studies; Case study 1 -- shaken baby death; Case study 2 -- arson homicide; Case study 3 -- possession of child porn; Conclusions; References
  • Chapter 4 -- The intersection between social media, crime, and digital forensics: #WhoDunIt?Introduction; Social media and crime; Social media and digital forensics; Social media evidence on the network; Social media evidence on the physical device; Summary; References; Chapter 5 -- Mobile device forensics: threats, challenges, and future trends; Introduction; The hardware versus software complexity trend; Cloud services and mobile platforms -- inherent vulnerabilities; There is an app for that -- forensic challenges and threats within apps; Social media apps; Native and non-native messaging apps
  • Multimedia and VoIP "streaming" appsCloud-based storage apps; Camera-enabled apps; Location data and apps; Geotagging and EXIF data within apps; Persistent threats and challenges -- what lies ahead for mobile device forensics; Data encryption and stronger passwords; "Burner" and Chinese phones; JTAG and Chipoff analysis -- advantages, challenges, and threats; Validation and best practices of mobile forensic tools and methods -- the forensic enigma; Conclusion; References; Chapter 6 -- Digital forensics in an eDiscovery world; Introduction; eDiscovery processes and EDRM; Cat or dog not mouse
Control code
934476226
Dimensions
unknown
Extent
1 online resource
Form of item
online
Isbn
9780128045428
Media category
computer
Media MARC source
rdamedia
Media type code
c
http://library.link/vocab/ext/overdrive/overdriveId
878827
Specific material designation
remote
System control number
(OCoLC)934476226

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...