Skip to:Content
|
Bottom
Cover image for Computer and intrusion forensics
Title:
Computer and intrusion forensics
Publication Information:
Boston : Artech House, c2003
ISBN:
9781580533690

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010019179 QA76.9.A25 C633 2003 Open Access Book Book
Searching...
Searching...
30000010059067 QA76.9.A25 C633 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy.


Author Notes

George Mohay holds a Ph.D. in theoretical chemistry from Monash University in Melbourne.

Mohay is adjunct professor in the Information Security Research Center, Queensland University of Technology. He has done extensive research in the areas of computer security, computer forensics, concurrency, component technology and distributed systems. He has published extensively.

050


Table of Contents

Eugene Spafford
Forewordp. xi
Prefacep. xvii
Acknowledgmentsp. xix
Disclaimerp. xxi
1 Computer Crime, Computer Forensics, and Computer Securityp. 1
1.1 Introductionp. 1
1.2 Human behavior in the electronic agep. 4
1.3 The nature of computer crimep. 6
1.4 Establishing a case in computer forensicsp. 12
1.4.1 Computer forensic analysis within the forensic traditionp. 14
1.4.2 The nature of digital evidencep. 21
1.4.3 Retrieval and analysis of digital evidencep. 23
1.4.4 Sources of digital evidencep. 27
1.5 Legal considerationsp. 29
1.6 Computer security and its relationship to computer forensicsp. 31
1.6.1 Basic communications on the Internetp. 32
1.6.2 Computer security and computer forensicsp. 35
1.7 Overview of the following chaptersp. 37
Referencesp. 39
2 Current Practicep. 41
2.1 Introductionp. 41
2.2 Electronic evidencep. 42
2.2.1 Secure boot, write blockers and forensic platformsp. 44
2.2.2 Disk file organizationp. 46
2.2.3 Disk and file imaging and analysisp. 49
2.2.4 File deletion, media sanitizationp. 57
2.2.5 Mobile telephones, PDAsp. 59
2.2.6 Discovery of electronic evidencep. 61
2.3 Forensic toolsp. 63
2.3.1 EnCasep. 67
2.3.2 ILook Investigatorp. 69
2.3.3 CFITp. 72
2.4 Emerging procedures and standardsp. 76
2.4.1 Seizure and analysis of electronic evidencep. 77
2.4.2 National and international standardsp. 86
2.5 Computer crime legislation and computer forensicsp. 90
2.5.1 Council of Europe convention on cybercrime and other international activitiesp. 90
2.5.2 Carnivore and RIPAp. 94
2.5.3 Antiterrorism legislationp. 98
2.6 Networks and intrusion forensicsp. 103
Referencesp. 104
3 Computer Forensics in Law Enforcement and National Securityp. 113
3.1 The origins and history of computer forensicsp. 113
3.2 The role of computer forensics in law enforcementp. 117
3.3 Principles of evidencep. 121
3.3.1 Jurisdictional issuesp. 123
3.3.2 Forensic principles and methodologiesp. 123
3.4 Computer forensics model for law enforcementp. 128
3.4.1 Computer forensic--secure, analyze, present (CFSAP) modelp. 128
3.5 Forensic examinationp. 133
3.5.1 Proceduresp. 133
3.5.2 Analysisp. 143
3.5.3 Presentationp. 146
3.6 Forensic resources and toolsp. 147
3.6.1 Operating systemsp. 147
3.6.2 Duplicationp. 149
3.6.3 Authenticationp. 152
3.6.4 Searchp. 153
3.6.5 Analysisp. 154
3.6.6 File viewersp. 159
3.7 Competencies and certificationp. 160
3.7.1 Training coursesp. 163
3.7.2 Certificationp. 164
3.8 Computer forensics and national securityp. 164
3.8.1 National securityp. 165
3.8.2 Critical infrastructure protectionp. 167
3.8.3 National security computer forensic organizationsp. 168
Referencesp. 169
4 Computer Forensics in Forensic Accountingp. 175
4.1 Auditing and fraud detectionp. 175
4.1.1 Detecting fraud--the auditor and technologyp. 176
4.2 Defining fraudulent activityp. 177
4.2.1 What is fraud?p. 178
4.2.2 Internal fraud versus external fraudp. 180
4.2.3 Understanding fraudulent behaviorp. 183
4.3 Technology and fraud detectionp. 184
4.3.1 Data mining and fraud detectionp. 187
4.3.2 Digit analysis and fraud detectionp. 188
4.3.3 Fraud detection toolsp. 189
4.4 Fraud detection techniquesp. 190
4.4.1 Fraud detection through statistical analysisp. 191
4.4.2 Fraud detection through pattern and relationship analysisp. 200
4.4.3 Dealing with vagueness in fraud detectionp. 204
4.4.4 Signatures in fraud detectionp. 205
4.5 Visual analysis techniquesp. 206
4.5.1 Link or relationship analysisp. 207
4.5.2 Time-line analysisp. 209
4.5.3 Clusteringp. 210
4.6 Building a fraud analysis modelp. 211
4.6.1 Stage 1: Define objectivesp. 212
4.6.2 Stage 2: Environmental scanp. 214
4.6.3 Stage 3: Data acquisitionp. 215
4.6.4 Stage 4: Define fraud rulesp. 216
4.6.5 Stage 5: Develop analysis methodologyp. 217
4.6.6 Stage 6: Data analysisp. 217
4.6.7 Stage 7: Review resultsp. 218
Referencesp. 219
Appendix 4Ap. 221
5 Case Studiesp. 223
5.1 Introductionp. 223
5.2 The case of "Little Nicky" Scarfop. 223
5.2.1 The legal challengep. 225
5.2.2 Keystroke logging systemp. 226
5.3 The case of "El Griton"p. 229
5.3.1 Surveillance on Harvard's computer networkp. 230
5.3.2 Identification of the intruder: Julio Cesar Arditap. 231
5.3.3 Targets of Ardita's activitiesp. 232
5.4 Melissap. 236
5.4.1 A word on macro virusesp. 236
5.4.2 The virusp. 237
5.4.3 Tracking the authorp. 239
5.5 The World Trade Center bombing (1993) and Operation Oplan Bojinkap. 242
5.6 Other casesp. 244
5.6.1 Testing computer forensics in courtp. 244
5.6.2 The case of the tender documentp. 248
Referencesp. 253
6 Intrusion Detection and Intrusion Forensicsp. 257
6.1 Intrusion detection, computer forensics, and information warfarep. 257
6.2 Intrusion detection systemsp. 264
6.2.1 The evolution of IDSp. 264
6.2.2 IDS in practicep. 267
6.2.3 IDS interoperability and correlationp. 274
6.3 Analyzing computer intrusionsp. 276
6.3.1 Event log analysisp. 278
6.3.2 Time-liningp. 280
6.4 Network securityp. 285
6.4.1 Defense in depthp. 285
6.4.2 Monitoring of computer networks and systemsp. 288
6.4.3 Attack types, attacks, and system vulnerabilitiesp. 295
6.5 Intrusion forensicsp. 303
6.5.1 Incident response and investigationp. 303
6.5.2 Analysis of an attackp. 306
6.5.3 A case study--security in cyberspacep. 308
6.6 Future directions for IDS and intrusion forensicsp. 310
Referencesp. 312
7 Research Directions and Future Developmentsp. 319
7.1 Introductionp. 319
7.2 Forensic data mining--finding useful patterns in evidencep. 323
7.3 Text categorizationp. 327
7.4 Authorship attribution: identifying e-mail authorsp. 331
7.5 Association rule mining--application to investigative profilingp. 335
7.6 Evidence extraction, link analysis, and link discoveryp. 339
7.6.1 Evidence extraction and link analysisp. 340
7.6.2 Link discoveryp. 343
7.7 Stegoforensic analysisp. 345
7.8 Image miningp. 349
7.9 Cryptography and cryptanalysisp. 355
7.10 The future--society and technologyp. 360
Referencesp. 364
Acronymsp. 369
About the Authorsp. 379
Indexp. 383
Go to:Top of Page