×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Cyber Crime Investigator's Field Guide / Edition 2
     

Cyber Crime Investigator's Field Guide / Edition 2

by Bruce Middleton, Richard B. Middleton
 

ISBN-10: 0849327687

ISBN-13: 9780849327681

Pub. Date: 01/25/2005

Publisher: Taylor & Francis

Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer

Overview

Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Second Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime.

This volume offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, UNIX/Linux commands, Cisco PIX commands, port numbers targeted by trojan horses, and more.

Product Details

ISBN-13:
9780849327681
Publisher:
Taylor & Francis
Publication date:
01/25/2005
Edition description:
REV
Pages:
296
Product dimensions:
6.10(w) x 9.30(h) x 1.00(d)

Related Subjects

Table of Contents

1The Initial Contact1
2Client Site Arrival5
3Evidence Collection Procedures9
Detailed Procedures for Obtaining a Bitstream Backup of a Hard Drive10
4Evidence Collection and Analysis Tools17
SafeBack17
GetTime20
FileList, FileCnvt, and Excel20
GetFree21
Swap Files and GetSwap22
GetSlack24
Temporary Files25
Filter_I26
Key Word Generation28
TextSearch Plus30
CRCMD534
DiskSig34
Doc35
Mcrypt36
Micro-Zap38
Map39
M-Sweep40
Net Threat Analyzer42
AnaDisk44
Seized45
Scrub45
Spaces47
NTFS FileList47
NTFS GetFree48
NTFS GetSlack49
NTFS View49
NTFS Check50
NTIcopy50
Disk Search 3251
EnCase53
Analyst's Notebook, iBase, and iGlass66
BackTracing71
5Password Recovery77
6Questions and Answers by Subject Area81
Evidence Collection81
Legal83
Evidence Analysis84
UNIX86
Military88
Hackers88
BackTracing89
Logs90
Encryption92
Government92
Networking92
E-Mail93
Usenet and IRC (Chat)94
7Recommended Reference Materials97
Perl and C Scripts97
UNIX, Windows, NetWare, and Macintosh98
Computer Internals99
Computer Networking100
Web Sites of Interest101
8Case Study103
Recommendations129
Appendix AGlossary133
Appendix BPort Numbers Used by Malicious Trojan Horse Programs137
Appendix CAttack Signatures141
Appendix DUNIX/Linux Commands143
Appendix ECisco PIX Firewall Commands159
Appendix FDiscovering Unauthorized Access to Your Computer165
Appendix GU.S. Department of Justice Search and Seizure Guidelines169
Searching and Seizing Computers without a Warrant170
Searching and Seizing Computers with a Warrant202
The Electronic Communications Privacy Act241
Electronic Surveillance in Communications Networks265
Evidence288
Appendices298
Appendix ASample Network Banner Language298
Appendix BSample 18 U.S.C. [section] 2703(d) Application and Order300
Appendix CSample Language for Preservation Request Letters Under U.S.C. [section] 2703(f)307
Appendix DSample Pen Register/Trap and Trace Application and Order309
Appendix ESample Subpoena Language313
Appendix FSample Language for Search Warrants and Accompanying Affidavits to Search and Seize Computers314
Index327
Footnotes330
The Author335
Index337

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews