Investigating Computer-Related Crime - Peter Stephenson, Keith Gilbert

Investigating Computer-Related Crime

Buch | Hardcover
404 Seiten
2013 | 2nd edition
Crc Press Inc (Verlag)
978-0-8493-1973-0 (ISBN)
168,35 inkl. MwSt
Written by an information security specialist, this title discusses cybercrime, its investigation, and the difficulties encountered by both public law enforcement officials and private corporate investigators. It offers insights into collecting evidence, interrogating suspects and witnesses, and handling crime in progress.
Since the last edition of this book was written more than a decade ago, cybercrime has evolved. Motives have not changed, but new means and opportunities have arisen with the advancement of the digital age. Investigating Computer-Related Crime: Second Edition incorporates the results of research and practice in a variety of venues, growth in the field, and new technology to offer a fresh look at the topic of digital investigation.

Following an introduction to cybercrime and its impact on society, this book examines:






Malware and the important differences between targeted attacks and general attacks
The framework for conducting a digital investigation, how it is conducted, and some of the key issues that arise over the course of an investigation
How the computer forensic process fits into an investigation
The concept of system glitches vs. cybercrime and the importance of weeding out incidents that don’t need investigating
Investigative politics that occur during the course of an investigation, whether to involve law enforcement, and when an investigation should be stopped
How to prepare for cybercrime before it happens
End-to-end digital investigation
Evidence collection, preservation, management, and effective use
How to critique your investigation and maximize lessons learned

This edition reflects a heightened focus on cyber stalking and cybercrime scene assessment, updates the tools used by digital forensic examiners, and places increased emphases on following the cyber trail and the concept of end-to-end digital investigation. Discussion questions at the end of each chapter are designed to stimulate further debate into this fascinating field.

Peter Stephenson, PhD, is a cyber criminologist, digital investigator, and digital forensic scientist at Norwich University (Vermont). He is a writer, researcher, and lecturer on information assurance, digital investigation, and forensics on large-scale computer networks. He has lectured extensively on digital investigation and security, and has written, edited, or contributed to 16 books and several hundred articles in major national and international trade, technical, and scientific publications. Dr. Stephenson is a Fellow of the Institute for Communications, Arbitration, and Forensics in the United Kingdom, an associate member of the American Academy of Forensic Sciences, a member of the Vidocq Society, and on the board of Vermont InfraGard. He holds the CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), and FICAF (Fellow of the Institute for Communications Arbitration and Forensics) designations, and his research is focused on cybercrime assessment and profiling compromised networks. Keith Gilbert is a senior information security specialist on the Verizon RISK Team. He obtained both his BS and MS in information assurance from Norwich University and is an experienced digital forensic analyst. Gilbert has worked in both the public and private sectors among organizations ranging from 50 to 200,000 employees. He holds the Global Information Assurance Certification (GIAC) Certified Forensic Analyst (GCFA) and GIAC Certified Incident Handler (GCIH) certifications and is an associate of the International Information Systems Security Certification Consortium ((ISC)2).

The Nature of Cybercrime. Cybercrime as We Enter the Twenty-First Century. The Potential Impacts of Cybercrime. Malware Attacks. Surgical Strikes and Shotgun Blasts. Investigating Cybercrime. A Framework for Conducting an Investigation of a Computer Security Incident. Look for the Hidden Flaw. Analyzing the Remnants of a Computer Security Incident. Launching the Investigation. Determining If a Crime Has Taken Place. Cover-Ups Are Common. Involving the Authorities. When an Investigation Cannot Continue. Preparing for Cybercrime. Building a Corporate Cyber "SWAT Team". Privacy and Computer Crime. Introduction to End-to-End Digital Investigation. Collecting and Analyzing Evidence of a Computer Crime. Using Evidence Effectively. Conducting Incident Postmortems. Appendix A. Appendix B. Appendix C. Index.

Erscheint lt. Verlag 5.6.2013
Zusatzinfo 4 Tables, black and white; 7 Illustrations, black and white
Verlagsort Bosa Roca
Sprache englisch
Maße 156 x 234 mm
Gewicht 703 g
Themenwelt Naturwissenschaften Biologie
Recht / Steuern Strafrecht Kriminologie
ISBN-10 0-8493-1973-0 / 0849319730
ISBN-13 978-0-8493-1973-0 / 9780849319730
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich

von Frank Neubacher

Buch | Softcover (2023)
Nomos (Verlag)
26,90
Grundsätze der Kriminalpraxis

von Horst Clages; Rolf Ackermann; Thomas Gundlach

Buch | Softcover (2022)
Kriminalistik Verlag
40,00