Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010341938 | KF8947.5 M37 2015 | Open Access Book | Book | Searching... |
Searching... | 30000010345562 | KF8947.5 M37 2015 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
An Updated Edition of the Definitive Computer Forensics TextUpdated to include the most current events and information on cyberterrorism, the second edition of Computer Forensics: Cybercriminals, Laws, and Evidence continues to balance technicality and legal analysis as it enters into the world of cybercrime by exploring what it is, how it is investigated, and the regulatory laws around the collection and use of electronic evidence. Students are introduced to the technology involved in computer forensic investigations and the technical and legal difficulties involved in searching, extracting, maintaining, and storing electronic evidence, while simultaneously looking at the legal implications of such investigations and the rules of legal procedure relevant to electronic evidence. Significant and current computer forensic developments are examined, as well as the implications for a variety of fields including computer science, security, criminology, law, public policy, and administration.
Table of Contents
Preface | p. xiii |
Acknowledgments | p. xv |
Chapter 1 Entering the World of Cybercrime | p. 1 |
Cybercrime: Denned | p. 1 |
Cybercrime Versus Traditional Crime | p. 2 |
Cybercrime Categories | p. 5 |
Combating Cybercrime | p. 20 |
Chapter Summary | p. 21 |
Key Terms | p. 21 |
Practical Exercise | p. 22 |
Critical Thinking Question | p. 22 |
Review Questions | p. 22 |
Footnotes | p. 23 |
Chapter 2 An Introduction to Computer Forensics Investigations and Electronic Evidence | p. 29 |
Computer Forensics: What Is It? | p. 29 |
Computer Forensics Investigations: The Basics | p. 30 |
Computer Forensics Investigations: A Four-Step Process | p. 34 |
Electronic Evidence: What Is It? | p. 38 |
Types of Evidence | p. 38 |
Authentication of Evidence | p. 46 |
Standards of Evidence | p. 48 |
Chapter Summary | p. 49 |
Key Terms | p. 49 |
Practical Exercise | p. 50 |
Review Questions | p. 50 |
Footnotes | p. 51 |
Chapter 3 Laws Regulating Access to Electronic Evidence | p. 55 |
Telecommunications and Electronic Communications Data | p. 55 |
The Statutory Background of Privacy Protection and Government Access to Data | p. 57 |
Chapter Summary | p. 74 |
Key Terms | p. 74 |
Critical Thinking Questions | p. 76 |
Review Questions | p. 77 |
Footnotes | p. 77 |
Chapter 4 Searches and Seizures of Computers and Electronic Evidence | p. 81 |
What Is Privacy and Why Is It Important? | p. 81 |
Constitutional Source of Privacy Protection: The Fourth Amendment | p. 83 |
Search Warrants | p. 87 |
Searching a Computer for Evidence | p. 95 |
Chapter Summary | p. 99 |
Key Terms | p. 100 |
Critical Thinking Questions | p. 100 |
Review Questions | p. 100 |
Footnotes | p. 101 |
Chapter 5 Cybercrime Laws: Which Statute for Which Crime? | p. 107 |
Computer Threats and Intrusions | p. 107 |
Financial Crimes and Fraud | p. 113 |
Intellectual Property Theft and Economic Espionage | p. 122 |
Personal Crimes | p. 128 |
Chapter Summary | p. 131 |
Key Terms | p. 131 |
Critical Thinking Question | p. 132 |
Review Questions | p. 133 |
Footnotes | p. 133 |
Chapter 6 Understanding the Computer-Networking Environment: Beware of the Scam Artists, Bullies, and Lurking Predators! | p. 141 |
The Art of Deceiving: Social Engineering | p. 141 |
Scams and Scam Artists | p. 142 |
Identity Theft | p. 153 |
Cyberbullying | p. 159 |
Child Exploitation Online | p. 165 |
Chapter Summary | p. 172 |
Key Terms | p. 173 |
Practical Exercise | p. 174 |
Review Questions | p. 174 |
Footnotes | p. 174 |
Chapter 7 Cyberterrorism: What It Is, What It Isn't, Why It Matters, and What to Do About It | p. 179 |
Defining Cyberterrorism | p. 179 |
Criminalizing Cyberterrorism | p. 189 |
Combating Cyberterrorism | p. 190 |
Chapter Summary | p. 192 |
Key Terms | p. 192 |
Critical Thinking Questions | p. 193 |
Review Questions | p. 193 |
Footnotes | p. 193 |
Chapter 8 Where Is the Electronic Evidence, and Which Tools Can We Use to Find It? | p. 199 |
The Location of Electronic Evidence | p. 199 |
Tools Used to Search and Collect Electronic Evidence | p. 219 |
Chapter Summary | p. 223 |
Key Terms | p. 223 |
Practical Exercises | p. 225 |
Critical Thinking Question | p. 225 |
Review Questions | p. 225 |
Footnotes | p. 225 |
Chapter 9 Crime and Incident Scene: What Should an Investigator Do? | p. 229 |
Conducting an Investigation | p. 229 |
Special Considerations for Cybercrime Investigations | p. 234 |
Identifying Evidence | p. 236 |
Analysis of Evidence | p. 237 |
How to Handle Evidence in an Investigation | p. 238 |
Hypothetical Criminal Investigation | p. 240 |
Extracting Electronic Evidence | p. 244 |
Chapter Summary | p. 249 |
Key Terms | p. 249 |
Critical Thinking Questions | p. 250 |
Review Questions | p. 250 |
Footnotes | p. 250 |
Chapter 10 Corporate Crimes and Policy Violations Involving Computers: How to Conduct a Corporate Investigation | p. 253 |
Corporate Investigations | p. 253 |
Corporate Criminal Activities and Policy Violations | p. 254 |
Preparing for the Investigation | p. 264 |
Conducting the Investigation | p. 266 |
Chapter Summary | p. 273 |
Key Terms | p. 273 |
Review Questions | p. 274 |
Footnotes | p. 275 |
Chapter 11 Email Forensics | p. 279 |
The Importance of Email Investigations | p. 279 |
Email: The Basics | p. 281 |
How co Conduct an Email Investigation | p. 287 |
Problems Encountered by Computer Forensics Investigators | p. 294 |
Chapter Summary | p. 298 |
Key Terms | p. 298 |
Practical Exercise | p. 299 |
Critical Thinking Question | p. 299 |
Review Questions | p. 299 |
Footnotes | p. 300 |
Chapter 12 Network Forensics: An Introduction | p. 303 |
Stand-Alone Versus Networked Devices | p. 303 |
Computer Networks | p. 303 |
Network Components | p. 306 |
Where Can Network-Related Evidence Be Found? | p. 309 |
Network Forensics Analysis Tools | p. 315 |
Special Issues When Conducting Investigations in a Networked Environment | p. 318 |
Preliminary Analysis | p. 319 |
Documentation and Collection | p. 319 |
Analysis and Preservation | p. 321 |
Chapter Summary | p. 324 |
Key Terms | p. 324 |
Review Questions | p. 326 |
Footnotes | p. 326 |
Chapter 13 Mobile Devices in Computer Forensics Investigations | p. 329 |
Role of Mobile Devices | p. 329 |
Mobile Phones and PDAs Versus Other Electronic Devices | p. 336 |
Which Tools Can Be Used to Retrieve Evidence? | p. 339 |
Mobile Device Investigations | p. 344 |
Chapter Summary | p. 350 |
Key Terms | p. 350 |
Practical Exercises | p. 351 |
Critical Thinking Questions | p. 351 |
Review Questions | p. 352 |
Footnotes | p. 352 |
Chapter 14 The Pretrial and Courtroom Experiences of a Computer Forensics Investigator | p. 357 |
Pretrial Procedures | p. 357 |
Testimony and Rules of Evidence | p. 360 |
The Role of the Computer Forensics Investigator in Pretrial Proceedings and Court | p. 366 |
Chapter Summary | p. 371 |
Key Terms | p. 372 |
Critical Thinking Question | p. 372 |
Review Questions | p. 372 |
Footnotes | p. 373 |
Glossary | p. 375 |
Index | p. 397 |