Cover image for Digital forensics explained
Title:
Digital forensics explained
Personal Author:
Publication Information:
Boca Raton, FL. : Taylor & Francis, CRC Press, 2013
Physical Description:
xxi, 176 p. : ill. ; 26 cm.
ISBN:
9781439874950

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010327898 HV8079.C65 G64 2013 Open Access Book Book
Searching...

On Order

Summary

Summary

The field of computer forensics has experienced significant growth recently and those looking to get into the industry have significant opportunity for upward mobility. Focusing on the concepts investigators need to know to conduct a thorough investigation, Digital Forensics Explained provides an overall description of the forensic practice from a practitioner's perspective.

Starting with an overview, the text describes best practices based on the author's decades of experience conducting investigations and working in information technology. It illustrates the forensic process, explains what it takes to be an investigator, and highlights emerging trends. Filled with helpful templates and contributions from seasoned experts in their respective fields, the book includes coverage of:

Internet and email investigations Mobile forensics for cell phones, iPads, music players, and other small devices Cloud computing from an architecture perspective and its impact on digital forensics Anti-forensic techniques that may be employed to make a forensic exam more difficult to conduct Recoverability of information from damaged media The progression of a criminal case from start to finish Tools that are often used in an examination, including commercial, free, and open-source tools; computer and mobile tools; and things as simple as extension cords Social media and social engineering forensics Case documentation and presentation, including sample summary reports and a cover sheet for a cell phone investigation

The text includes acquisition forms, a sequential process outline to guide your investigation, and a checklist of supplies you'll need when responding to an incident. Providing you with the understanding and the tools to deal with suspects who find ways to make their digital activities hard to trace, the book also considers cultural implications, ethics, and the psychological effects that digital forensics investigations can have on investigators.


Author Notes

Dr. Greg Gogolin is a father, as well as a professor at Ferris State University in Big Rapids, Michigan. Greg spent almost twenty years in information technology before becoming a professor at Ferris State University in 1999. While at Ferris State University, he has been the primary author of the bachelor of science degree in information security and intelligence and the master of science in information security and intelligence.

Prior to Ferris, he worked as a programmer, database administrator, systems analyst and project manager at small and multinational corporations. Dr. Gogolin actively consults in information technology and is a licensed private investigator specializing in digital forensics cases. He has degrees in arts, computer information systems, applied biology, computer information systems management, and administration and holds a doctorate from Michigan State University. He has current CISSP, EnCE, and PMP certifications, and is particularly thankful to have the opportunity to teach some of the brightest students in the world in the bachelor of science in information security and intelligence and the master of science in information systems management programs at Ferris State University in Michigan, and the master of science in cyber security at the University of Maryland University Center.

Dr. Gogolin has published in Information Security Journal: "A Global Perspective, Digital Investigations, Digital Forensic Practice" and has made chapter contributions to IGI Global's Mobile Technology Consumption: Opportunities and Challenges; Virtual Worlds and E-Commerce: Technologies and Applications for Building Customer Relationships ; and Nova Science Publisher's Crime Rates, Types, and Hot Spots, as well as other periodicals. He has presented at many conferences and collaborates on information security and digital forensic issues worldwide. His current research interest is a National Science Foundation-funded inquiry into the recovery of data from damaged media. He is also actively building relationships with other universities worldwide, including Saxion University of Applied Science, the Netherlands.


Reviews 1

Choice Review

This timely second edition offers a valuable treatise on the exploding field of digital forensics. The forensic process, approaches and best practice in digital forensics, and the various tools used in a forensics examination are introduced in chapters 1--3. Chapters 4--7 cover internet and email investigations, mobile forensics, and impacts of cloud computing, including one exemplary criminal case study. Chapter 8 explains how such cases are documented and presented. Chapters 9--10 discuss forensics tailored to social media (internet tools and what they allow users to do) and social engineering (manipulating people to release information). Chapter 11 ("Anti-forensics") explains how cybercriminals make their activities covert. Chapter 12 covers link analysis and how the pieces of the puzzle are put together. Chapter 13 discusses psychological effects of digital forensics investigations. Finally, chapters 14 and 15 present several cases. This reviewer found the case studies particularly interesting: chapter 14 ("Someone is Watching") concerns a woman who asked a supposed friend to help with her laptop; the latter person instead installed an application to surveil her activities. The book can serve as a textbook in digital forensics and as an excellent reference guide for case investigators. Interested general readers will find the text informative, as will upper-level and graduate students, faculty, and working professionals. Summing Up: Recommended. Upper-division undergraduates. Graduate students, faculty, and professionals. General readers. --Charles C. Tappert, Pace University


Table of Contents

Gerald EmerickJason OttingBarbara L. CiaramitaroBarbara L. CiaramitaroVelislav Pavlov
Prefacep. ix
Acknowledgmentsp. xiii
Authorsp. xvii
Contributorsp. xxi
Chapter 1 What is Digital Forensics, and What Should You Know About It?p. 1
Introductionp. 1
Forensic Sciencep. 1
What Does It Take to Be a Digital Forensic Investigator?p. 3
Education Opportunitiesp. 4
What Opportunities Are There for Digital Forensic Investigators?p. 5
What Are the Trends and Challenges in Digital Forensics?p. 7
Resources Available to Digital Forensic Investigatorsp. 10
Conclusionp. 11
Referencesp. 11
Chapter 2 Digital Forensic Approaches and Best Practicesp. 13
Introductionp. 13
First Responsep. 15
Responding to a Casep. 20
Conclusionp. 32
Referencesp. 32
Other Useful Resourcesp. 32
Chapter 3 Digital Forensics Tool Kitp. 35
Introductionp. 35
Computer Forensicsp. 35
Write Blockersp. 37
Imagingp. 38
Add-Ons and Other Technologiesp. 39
Toolsp. 42
Mobile Forensics Toolsp. 43
Visual Analysisp. 44
Secured Storagep. 45
Damaged Mediap. 45
Summaryp. 45
Chapter 4 Internet and E-Mail Examinationsp. 47
Introductionp. 47
E-Mailp. 47
Chat and Messaging Logsp. 48
Peer-to-Peerp. 48
Search Engine Activityp. 49
Internet Historyp. 50
Social Networking and Gamingp. 51
Malware and Virusesp. 51
Summaryp. 54
Chapter 5 Mobile Forensicsp. 55
Introductionp. 55
Mobile Phone Technologyp. 55
How a Call Is Madep. 55
Forensic Challengesp. 56
Forensic Processp. 58
Digital Cell Phone Investigationp. 61
Geographic Positioning Systemsp. 66
Camerasp. 66
Summaryp. 66
Cellular Communications Technology Overviewp. 66
Referencesp. 68
Chapter 6 Cloud Computing and Digital Forensicsp. 69
Introductionp. 69
Infrastructure as a Servicep. 71
Platform as a Servicep. 71
Software as a Servicep. 72
Service and Deployment Modelsp. 72
Customer versus Cloud Provider Responsibilitiesp. 73
Other Service Modelsp. 74
Multi-Tenancyp. 76
User Access and Provisioningp. 77
Data Protection and Breachesp. 79
Information Technology and Information Security Governance and Change Control Processesp. 81
Service Access Vulnerabilitiesp. 82
Migration Planningp. 83
Incident Responsep. 84
Virtualizationp. 84
Security Benefits of Cloudp. 85
Chapter 7 Incident Responsep. 87
Introductionp. 87
Case Summaryp. 87
The Initiation of an Investigationp. 87
Informationp. 88
Evidence Gatheringp. 89
Interviews and the Analysis of Evidencep. 90
Analysis of the Electronic Evidencep. 91
Prosecution and Testimonyp. 93
Things to Considerp. 95
Conclusionp. 96
Chapter 8 Report Writing and Presentationp. 97
Introductionp. 97
Report Content and Considerationsp. 97
Sample Reportsp. 99
Presenting and Testifyingp. 110
Archivingp. 111
Summaryp. 111
Chapter 9 Social Media Forensicsp. 113
Introduction to Social Mediap. 113
Social Networkingp. 113
E-Mailp. 113
Blogsp. 113
Microblogsp. 114
Event Coordinationp. 114
Location Identificationp. 114
Multimedia Sharingp. 114
Searchp. 114
Wikisp. 115
Web Conferencingp. 115
Virtual Worldsp. 115
Social Media Forensicsp. 116
Street Gangsp. 116
Terrorist Activityp. 118
White Collar Crimesp. 120
Summaryp. 120
Referencesp. 123
Chapter 10 Social Engineering Forensicsp. 125
Introduction to Social Engineeringp. 125
Online Social Engineering Attacksp. 125
Telephone Social Engineering Attacksp. 126
Waste Management Social Engineering Attacksp. 127
Mobile Device Social Engineering Attacksp. 127
Personal Social Engineering Attacksp. 128
Reverse Social Engineering Attacksp. 129
Social Engineering Forensicsp. 132
Social Engineering Attack Vector Vulnerabilitiesp. 133
Conclusionp. 134
Referencesp. 135
Chapter 11 Anti-Forensicsp. 137
Anti-Forensic Definition and Conceptsp. 137
Anti-Forensic Methodsp. 138
Eliminate Trailsp. 139
Hide Evidencep. 142
Destroy Evidencep. 147
Mobile Anti-Forensicsp. 148
Conclusionp. 149
Referencesp. 150
Chapter 12 Link and Visual Analysisp. 151
Introductionp. 151
Link and Visual Analysisp. 151
Conclusionp. 157
Chapter 13 Psychological, Ethical, and Cultural Implications of Digital Forensicsp. 159
Introductionp. 159
Psychological Implications of Digital Forensicsp. 159
Ethical Implications of Digital Forensicsp. 165
Cultural Implications of Digital Forensicsp. 166
Conclusionp. 168
Referencesp. 168
Indexp. 169