TechnoSecurity's Guide to E-Discovery and Digital Forensics -

TechnoSecurity's Guide to E-Discovery and Digital Forensics (eBook)

A Comprehensive Handbook

Jack Wiles (Herausgeber)

eBook Download: PDF
2011 | 1. Auflage
400 Seiten
Elsevier Science (Verlag)
978-0-08-055881-3 (ISBN)
Systemvoraussetzungen
48,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.
IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world.
The TechnoSecurity Guide to Digital Forensics and E-Discovery features:
* Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics
* Bonus chapters on how to build your own Forensics Lab
* 50% discount to the upcoming Techno Forensics conference for everyone
who purchases a book
TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics Bonus chapters on how to build your own Forensics Lab 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book

Cover 1
Contents 15
Foreword 27
Chapter 1: Authentication: Are You Investigating the Right Person? 29
Introduction 30
Authentication: What Is It? 30
An Authentication War Story from 20 Years Ago: The Outside Job 33
A Second Authentication War Story 35
Let’s Do Something about This Authentication Problem 37
A Third Authentication War Story 39
Security Threats in the Future 41
The Inside Job 42
A Final Authentication War Story 43
Key Loggers 101 49
Some 21st Century Solutions to Authentication 51
Security Awareness Training 52
The Rest of the Book 53
Chapter 2: Digital Forensics: An Overview 61
Introduction 62
Digital Forensic Principles 62
Digital Environments 71
Digital Forensic Methodologies 73
Chapter 3: Working with Other Agencies 93
Introduction 94
Building the Relationship 96
Building Your Package of Information 98
Don’t Shop Your Cases 101
A Discussion of Agencies 102
The Big Two: The U.S. Secret Service and the FBI 103
Other Federal Cyber Crime Investigations Agencies 118
Chapter 4: Developing an Enterprise Digital Investigative/ Electronic Discovery Capability 123
Introduction 124
Identifying Requirements for an Enterprise Digital Investigative/ Electronic Discovery Capability 125
Administrative Considerations for an Enterprise Digital Investigative/Electronic Discovery Capability 131
Identifying Resources (Software/Hardware/Facility) for Your Team 145
Chapter 5: Forensic Examination in a Terabyte World 157
Introduction 158
Volume Challenges 158
Network and Hardware Challenges 161
Future Digital Forensic Solutions 162
The FTK 2.x Model 168
Chapter 6: Selecting Equipment for a Computer Forensic Laboratory 175
Introduction 176
Forensic Workstations for the Laboratory 176
Forensic Workstations for the Mobile or Field Laboratory 186
Hardware Write-Protection Devices 188
Data Storage 194
Miscellaneous Items 195
Chapter 7: Integrating a Quality Management System in a Digital Forensic Laboratory 203
Introduction 204
Quality Planning, Quality Reviews, and Continuous Quality Improvement 205
Other Challenges: Ownership, Responsibility, and Authority 223
Chapter 8: Balancing E-discovery Challenges with Legal and IT Requirements 235
Introduction 236
Drivers of E-discovery Engineering 236
Locations, Forms, and Preservation of Electronically Stored Information 240
Legal and IT Team Considerations for Electronic Discovery 244
Are You Litigation Ready? 250
E-discovery Tools 260
Chapter 9: E-mail Forensics 265
Introduction 266
Where to Start 266
Forensic Acquisition 274
Processing Local Mail Archives 275
Chapter 10: Murder and Money: The Story of Standards, Accreditation, and Certification in Computer Forensics 289
Introduction 290
Standards 290
Accreditation 291
Certification 291
Rough Beginnings 292
Money to the Rescue 294
Standards and Computer Forensics 294
Certification Options for the Digital Evidence Analyst 298
Another Standards Option 299
Chapter 11: Starting a Career in the Field of Techno Forensics 305
Introduction 306
Occupations 306
Professional Organizations 308
Professional Certifications 309
Degree Programs 316
Appendix A: Death by a Thousand Cuts By Johnny Long with Anthony Kokocinski 343
Appendix B: Credibility Is Believability— Success in the Courtroom 397
Introduction 398
First Impressions 398
Appearance 399
Body Language 407
Speech 415
Index 423

Erscheint lt. Verlag 13.10.2011
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Recht / Steuern Strafrecht Kriminologie
Sozialwissenschaften
ISBN-10 0-08-055881-X / 008055881X
ISBN-13 978-0-08-055881-3 / 9780080558813
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 9,3 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
79,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99