Cover image for Computer forensics : cybercriminals, laws, and evidence
Title:
Computer forensics : cybercriminals, laws, and evidence
Personal Author:
Publication Information:
Sudbury, Mass. : Jones & Bartlett Learning, 2015
Physical Description:
xiv, 368 p. ; 23 cm.
ISBN:
9781449692223

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010341938 KF8947.5 M37 2015 Open Access Book Book
Searching...
Searching...
30000010345562 KF8947.5 M37 2015 Open Access Book Book
Searching...

On Order

Summary

Summary

An Updated Edition of the Definitive Computer Forensics TextUpdated to include the most current events and information on cyberterrorism, the second edition of Computer Forensics: Cybercriminals, Laws, and Evidence continues to balance technicality and legal analysis as it enters into the world of cybercrime by exploring what it is, how it is investigated, and the regulatory laws around the collection and use of electronic evidence. Students are introduced to the technology involved in computer forensic investigations and the technical and legal difficulties involved in searching, extracting, maintaining, and storing electronic evidence, while simultaneously looking at the legal implications of such investigations and the rules of legal procedure relevant to electronic evidence. Significant and current computer forensic developments are examined, as well as the implications for a variety of fields including computer science, security, criminology, law, public policy, and administration.


Table of Contents

Prefacep. xiii
Acknowledgmentsp. xv
Chapter 1 Entering the World of Cybercrimep. 1
Cybercrime: Dennedp. 1
Cybercrime Versus Traditional Crimep. 2
Cybercrime Categoriesp. 5
Combating Cybercrimep. 20
Chapter Summaryp. 21
Key Termsp. 21
Practical Exercisep. 22
Critical Thinking Questionp. 22
Review Questionsp. 22
Footnotesp. 23
Chapter 2 An Introduction to Computer Forensics Investigations and Electronic Evidencep. 29
Computer Forensics: What Is It?p. 29
Computer Forensics Investigations: The Basicsp. 30
Computer Forensics Investigations: A Four-Step Processp. 34
Electronic Evidence: What Is It?p. 38
Types of Evidencep. 38
Authentication of Evidencep. 46
Standards of Evidencep. 48
Chapter Summaryp. 49
Key Termsp. 49
Practical Exercisep. 50
Review Questionsp. 50
Footnotesp. 51
Chapter 3 Laws Regulating Access to Electronic Evidencep. 55
Telecommunications and Electronic Communications Datap. 55
The Statutory Background of Privacy Protection and Government Access to Datap. 57
Chapter Summaryp. 74
Key Termsp. 74
Critical Thinking Questionsp. 76
Review Questionsp. 77
Footnotesp. 77
Chapter 4 Searches and Seizures of Computers and Electronic Evidencep. 81
What Is Privacy and Why Is It Important?p. 81
Constitutional Source of Privacy Protection: The Fourth Amendmentp. 83
Search Warrantsp. 87
Searching a Computer for Evidencep. 95
Chapter Summaryp. 99
Key Termsp. 100
Critical Thinking Questionsp. 100
Review Questionsp. 100
Footnotesp. 101
Chapter 5 Cybercrime Laws: Which Statute for Which Crime?p. 107
Computer Threats and Intrusionsp. 107
Financial Crimes and Fraudp. 113
Intellectual Property Theft and Economic Espionagep. 122
Personal Crimesp. 128
Chapter Summaryp. 131
Key Termsp. 131
Critical Thinking Questionp. 132
Review Questionsp. 133
Footnotesp. 133
Chapter 6 Understanding the Computer-Networking Environment: Beware of the Scam Artists, Bullies, and Lurking Predators!p. 141
The Art of Deceiving: Social Engineeringp. 141
Scams and Scam Artistsp. 142
Identity Theftp. 153
Cyberbullyingp. 159
Child Exploitation Onlinep. 165
Chapter Summaryp. 172
Key Termsp. 173
Practical Exercisep. 174
Review Questionsp. 174
Footnotesp. 174
Chapter 7 Cyberterrorism: What It Is, What It Isn't, Why It Matters, and What to Do About Itp. 179
Defining Cyberterrorismp. 179
Criminalizing Cyberterrorismp. 189
Combating Cyberterrorismp. 190
Chapter Summaryp. 192
Key Termsp. 192
Critical Thinking Questionsp. 193
Review Questionsp. 193
Footnotesp. 193
Chapter 8 Where Is the Electronic Evidence, and Which Tools Can We Use to Find It?p. 199
The Location of Electronic Evidencep. 199
Tools Used to Search and Collect Electronic Evidencep. 219
Chapter Summaryp. 223
Key Termsp. 223
Practical Exercisesp. 225
Critical Thinking Questionp. 225
Review Questionsp. 225
Footnotesp. 225
Chapter 9 Crime and Incident Scene: What Should an Investigator Do?p. 229
Conducting an Investigationp. 229
Special Considerations for Cybercrime Investigationsp. 234
Identifying Evidencep. 236
Analysis of Evidencep. 237
How to Handle Evidence in an Investigationp. 238
Hypothetical Criminal Investigationp. 240
Extracting Electronic Evidencep. 244
Chapter Summaryp. 249
Key Termsp. 249
Critical Thinking Questionsp. 250
Review Questionsp. 250
Footnotesp. 250
Chapter 10 Corporate Crimes and Policy Violations Involving Computers: How to Conduct a Corporate Investigationp. 253
Corporate Investigationsp. 253
Corporate Criminal Activities and Policy Violationsp. 254
Preparing for the Investigationp. 264
Conducting the Investigationp. 266
Chapter Summaryp. 273
Key Termsp. 273
Review Questionsp. 274
Footnotesp. 275
Chapter 11 Email Forensicsp. 279
The Importance of Email Investigationsp. 279
Email: The Basicsp. 281
How co Conduct an Email Investigationp. 287
Problems Encountered by Computer Forensics Investigatorsp. 294
Chapter Summaryp. 298
Key Termsp. 298
Practical Exercisep. 299
Critical Thinking Questionp. 299
Review Questionsp. 299
Footnotesp. 300
Chapter 12 Network Forensics: An Introductionp. 303
Stand-Alone Versus Networked Devicesp. 303
Computer Networksp. 303
Network Componentsp. 306
Where Can Network-Related Evidence Be Found?p. 309
Network Forensics Analysis Toolsp. 315
Special Issues When Conducting Investigations in a Networked Environmentp. 318
Preliminary Analysisp. 319
Documentation and Collectionp. 319
Analysis and Preservationp. 321
Chapter Summaryp. 324
Key Termsp. 324
Review Questionsp. 326
Footnotesp. 326
Chapter 13 Mobile Devices in Computer Forensics Investigationsp. 329
Role of Mobile Devicesp. 329
Mobile Phones and PDAs Versus Other Electronic Devicesp. 336
Which Tools Can Be Used to Retrieve Evidence?p. 339
Mobile Device Investigationsp. 344
Chapter Summaryp. 350
Key Termsp. 350
Practical Exercisesp. 351
Critical Thinking Questionsp. 351
Review Questionsp. 352
Footnotesp. 352
Chapter 14 The Pretrial and Courtroom Experiences of a Computer Forensics Investigatorp. 357
Pretrial Proceduresp. 357
Testimony and Rules of Evidencep. 360
The Role of the Computer Forensics Investigator in Pretrial Proceedings and Courtp. 366
Chapter Summaryp. 371
Key Termsp. 372
Critical Thinking Questionp. 372
Review Questionsp. 372
Footnotesp. 373
Glossaryp. 375
Indexp. 397