Cyber Crime Investigator's Field Guide

This third edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, where, what, when, why and how in the investigation of cybercrime.

1117052708
Cyber Crime Investigator's Field Guide

This third edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, where, what, when, why and how in the investigation of cybercrime.

59.99 Pre Order
Cyber Crime Investigator's Field Guide

Cyber Crime Investigator's Field Guide

by Bruce Middleton
Cyber Crime Investigator's Field Guide

Cyber Crime Investigator's Field Guide

by Bruce Middleton

Paperback(3rd ed.)

$59.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
    Available for Pre-Order. This item will be released on October 8, 2024
  • PICK UP IN STORE

    Store Pickup available after publication date.

Related collections and offers


Overview

This third edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, where, what, when, why and how in the investigation of cybercrime.


Product Details

ISBN-13: 9781032301891
Publisher: CRC Press
Publication date: 10/08/2024
Edition description: 3rd ed.
Pages: 352
Product dimensions: 6.12(w) x 9.19(h) x (d)

About the Author

Bruce Middleton, CISSP, CEH, NSA IAM, and PMP, is a graduate of the University of Houston (BSEET), located in Houston, Texas, and of DeVry University (MBA).

Bruce has over 25 years of experience in the design and security of data communications networks. He began his career with the National Security Agency (NSA) while serving in the United States Army. He has worked on a number of extremely interesting projects for the intelligence community, Department of Defense, and other federal government agencies over the past three decades while working with government contractors such as Boeing, United Technologies, BAE Systems, Harris, and General Dynamics. Bruce was also a key player on the design/security of the communication system for NASA's International Space Station and a registered private detective in the state of Virginia.

Bruce is an international speaker on computer crime and has authored numerous articles for Security Management magazine and is a member of the FBI's InfraGard program. His latest venture for the past 5 years has been in the rail transportation industry with a global rail powerhouse named Alstom (Alstom.com), a French company headquartered in Paris, France, where Bruce served as the North American Regional Cyber Security Manager.

Table of Contents

1The Initial Contact1
2Client Site Arrival5
3Evidence Collection Procedures9
Detailed Procedures for Obtaining a Bitstream Backup of a Hard Drive10
4Evidence Collection and Analysis Tools17
SafeBack17
GetTime20
FileList, FileCnvt, and Excel20
GetFree21
Swap Files and GetSwap22
GetSlack24
Temporary Files25
Filter_I26
Key Word Generation28
TextSearch Plus30
CRCMD534
DiskSig34
Doc35
Mcrypt36
Micro-Zap38
Map39
M-Sweep40
Net Threat Analyzer42
AnaDisk44
Seized45
Scrub45
Spaces47
NTFS FileList47
NTFS GetFree48
NTFS GetSlack49
NTFS View49
NTFS Check50
NTIcopy50
Disk Search 3251
EnCase53
Analyst's Notebook, iBase, and iGlass66
BackTracing71
5Password Recovery77
6Questions and Answers by Subject Area81
Evidence Collection81
Legal83
Evidence Analysis84
UNIX86
Military88
Hackers88
BackTracing89
Logs90
Encryption92
Government92
Networking92
E-Mail93
Usenet and IRC (Chat)94
7Recommended Reference Materials97
Perl and C Scripts97
UNIX, Windows, NetWare, and Macintosh98
Computer Internals99
Computer Networking100
Web Sites of Interest101
8Case Study103
Recommendations129
Appendix AGlossary133
Appendix BPort Numbers Used by Malicious Trojan Horse Programs137
Appendix CAttack Signatures141
Appendix DUNIX/Linux Commands143
Appendix ECisco PIX Firewall Commands159
Appendix FDiscovering Unauthorized Access to Your Computer165
Appendix GU.S. Department of Justice Search and Seizure Guidelines169
Searching and Seizing Computers without a Warrant170
Searching and Seizing Computers with a Warrant202
The Electronic Communications Privacy Act241
Electronic Surveillance in Communications Networks265
Evidence288
Appendices298
Appendix ASample Network Banner Language298
Appendix BSample 18 U.S.C. [section] 2703(d) Application and Order300
Appendix CSample Language for Preservation Request Letters Under U.S.C. [section] 2703(f)307
Appendix DSample Pen Register/Trap and Trace Application and Order309
Appendix ESample Subpoena Language313
Appendix FSample Language for Search Warrants and Accompanying Affidavits to Search and Seize Computers314
Index327
Footnotes330
The Author335
Index337
From the B&N Reads Blog

Customer Reviews