Details

Digital Forensics


Digital Forensics


1. Aufl.

von: André Årnes

71,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 18.05.2017
ISBN/EAN: 9781119262411
Sprache: englisch
Anzahl Seiten: 384

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical field</b></p> <p>Written by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab) at the Norwegian University of Science and Technology (NTNU), this textbook takes a scientific approach to digital forensics ideally suited for university courses in digital forensics and information security. Each chapter was written by an accomplished expert in his or her field, many of them with extensive experience in law enforcement and industry. The author team comprises experts in digital forensics, cybercrime law, information security and related areas.  </p> <p>Digital forensics is a key competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. Considering the astonishing pace at which new information technology – and new ways of exploiting information technology – is brought on line, researchers and practitioners regularly face new technical challenges, forcing them to continuously upgrade their investigatory skills. Designed to prepare the next generation to rise to those challenges, the material contained in <i>Digital Forensics</i> has been tested and refined by use in both graduate and undergraduate programs and subjected to formal evaluations for more than ten years.</p> <ul> <li>Encompasses all aspects of the field, including methodological, scientific, technical and legal matters</li> <li>Based on the latest research, it provides novel insights for students, including an informed look at the future of digital forensics</li> <li>Includes test questions from actual exam sets, multiple choice questions suitable for online use and numerous visuals, illustrations and case example images</li> <li>Features real-word examples and scenarios, including court cases and technical problems, as well as a rich library of academic references and references to online media</li> </ul> <p><i>Digital Forensics </i>is an excellent introductory text for programs in computer science and computer engineering and for master degree programs in military and police education. It is also a valuable reference for legal practitioners, police officers, investigators, and forensic practitioners seeking to gain a deeper understanding of digital forensics and cybercrime.</p>
<p>Preface xv</p> <p>List of Contributors xvii</p> <p>List of Figures xxi</p> <p>List of Tables xxv</p> <p>List of Examples xxvii</p> <p>List of Definitions xxix</p> <p>List of Abbreviations xxxi</p> <p><b>1 Introduction 1</b></p> <p><i>André Årnes</i></p> <p>1.1 Forensic Science 1</p> <p>1.1.1 History of Forensic Science 2</p> <p>1.1.2 Locard’s Exchange Principle 2</p> <p>1.1.3 Crime Reconstruction 3</p> <p>1.1.4 Investigations 3</p> <p>1.1.5 Evidence Dynamics 4</p> <p>1.2 Digital Forensics 4</p> <p>1.2.1 Crimes and Incidents 5</p> <p>1.2.2 Digital Devices, Media, and Objects 5</p> <p>1.2.3 Forensic Soundness and Fundamental Principles 5</p> <p>1.2.4 Crime Reconstruction in Digital Forensics 6</p> <p>1.3 Digital Evidence 7</p> <p>1.3.1 Layers of Abstraction 7</p> <p>1.3.2 Metadata 7</p> <p>1.3.3 Error, Uncertainty, and Loss 7</p> <p>1.3.4 Online Bank Fraud – A Real-World Example 8</p> <p>1.3.4.1 Modus Operandi 8</p> <p>1.3.4.2 The SpyEye Case 8</p> <p>1.4 Further Reading 9</p> <p>1.5 Chapter Overview 10</p> <p>1.6 Comments on Citation and Notation 10</p> <p><b>2 The Digital Forensics Process 13</b></p> <p><i>Anders O. Flaglien</i></p> <p>2.1 Introduction 13</p> <p>2.1.1 Why Do We Need a Process? 14</p> <p>2.1.2 Principles of a Forensics Process 15</p> <p>2.1.3 Finding the Digital Evidence 15</p> <p>2.1.4 Introducing the Digital Forensics Process 16</p> <p>2.2 The Identification Phase 17</p> <p>2.2.1 Preparations and Deployment of Tools and Resources 18</p> <p>2.2.2 The First Responder 19</p> <p>2.2.3 At the Scene of the Incident 21</p> <p>2.2.3.1 Preservation Tasks 22</p> <p>2.2.4 Dealing with Live and Dead Systems 22</p> <p>2.2.5 Chain of Custody 23</p> <p>2.3 The Collection Phase 24</p> <p>2.3.1 Sources of Digital Evidence 26</p> <p>2.3.2 Systems Physically Tied to a Location 28</p> <p>2.3.3 Multiple Evidence Sources 28</p> <p>2.3.4 Reconstruction 28</p> <p>2.3.5 Evidence Integrity and Cryptographic Hashes 29</p> <p>2.3.6 Order of Volatility 30</p> <p>2.3.7 Dual-Tool Verification 32</p> <p>2.3.8 Remote Acquisition 32</p> <p>2.3.9 External Competency and Forensics Cooperation 33</p> <p>2.4 The Examination Phase 33</p> <p>2.4.1 Initial Data Source Examination and Preprocessing 34</p> <p>2.4.2 Forensic File Formats and Structures 35</p> <p>2.4.3 Data Recovery 35</p> <p>2.4.4 Data Reduction and Filtering 36</p> <p>2.4.5 Timestamps 37</p> <p>2.4.6 Compression, Encryption and Obfuscation 37</p> <p>2.4.7 Data and File Carving 38</p> <p>2.4.8 Automation 39</p> <p>2.5 The Analysis Phase 39</p> <p>2.5.1 Layers of Abstraction 40</p> <p>2.5.2 Evidence Types 40</p> <p>2.5.3 String and Keyword Searches 41</p> <p>2.5.4 Anti-Forensics 42</p> <p>2.5.4.1 Computer Media Wiping 42</p> <p>2.5.4.2 Analysis of Encrypted and Obfuscated Data 42</p> <p>2.5.5 Automated Analysis 43</p> <p>2.5.6 Timelining of Events 43</p> <p>2.5.7 Graphs and Visual Representations 43</p> <p>2.5.8 Link Analysis 44</p> <p>2.6 The Presentation Phase 45</p> <p>2.6.1 The Final Reports 46</p> <p>2.6.2 Presentation of Evidence and Work Conducted 46</p> <p>2.6.3 The Chain of Custody Circle Closes 47</p> <p>2.7 Summary 47</p> <p>2.8 Exercises 48</p> <p><b>3 Cybercrime Law 51</b></p> <p><i>Inger Marie Sunde</i></p> <p>3.1 Introduction 51</p> <p>3.2 The International Legal Framework of Cybercrime Law 54</p> <p>3.2.1 The Individuals Involved in Criminal Activity and in CrimePreventing Initiatives 54</p> <p>3.2.2 The National Legal System versus the International Legal Framework 55</p> <p>3.2.3 Fundamental Rights Relating to Cybercrime Law – The ECHR 56</p> <p>3.2.3.1 The ECtHR as a Driving Force for Development of Human Rights 57</p> <p>3.2.3.2 The Right to Bring a Case before the ECtHR 57</p> <p>3.2.3.3 A Special Note on Transborder Search and Surveillance 58</p> <p>3.2.3.4 The Connection between Fundamental Rights and the Rule of Law 60</p> <p>3.2.3.5 The Principle of Legality in the Context of Crime 60</p> <p>3.2.3.6 The Principle of Legality in the Context of a Criminal Investigation 61</p> <p>3.2.3.7 The Positive Obligation of the Nation State 63</p> <p>3.2.3.8 The Right to Fair Trial 64</p> <p>3.2.3.9 A Special Note on Evidence Rules in Different Legal Systems 68</p> <p>3.2.3.10 Possible Outcomes of a Violation of Fundamental Rights 69</p> <p>3.2.4 Special Legal Framework: The Cybercrime Convention 69</p> <p>3.2.5 Interpretation of Cybercrime Law 72</p> <p>3.2.5.1 Interpretation of Substantive Criminal Law 72</p> <p>3.2.5.2 Application of Old Criminal Provisions to New Modes of Conduct 74</p> <p>3.2.5.3 Interpretation of Procedural Provisions Authorizing Coercive Measures 75</p> <p>3.3 Digital Crime – Substantive Criminal Law 76</p> <p>3.3.1 General Conditions for Criminal Liability 77</p> <p>3.3.2 Real-Life Modus Operandi 80</p> <p>3.3.3 Offenses against the Confidentiality, Integrity, and Availability of Computer Data and Systems 81</p> <p>3.3.3.1 Illegal Access and Illegal Interception 82</p> <p>3.3.3.2 Data and System Interference 85</p> <p>3.3.3.3 Misuse of Devices 88</p> <p>3.3.4 Computer-Related Offenses 89</p> <p>3.3.5 Content-Related Offenses 91</p> <p>3.3.6 Offenses Related to Infringements of Copyright and Related Rights 93</p> <p>3.3.7 Racist and Xenophobic Speech 94</p> <p>3.4 Investigation Methods for Collecting Digital Evidence 95</p> <p>3.4.1 The Digital Forensic Process in the Context of Criminal Procedure 95</p> <p>3.4.2 Computer Data That Are Publicly Available 97</p> <p>3.4.2.1 Transborder Access to Stored Computer Data Where Publicly Available 98</p> <p>3.4.2.2 Online Undercover Operations 98</p> <p>3.4.3 Scope and Safeguards of the Investigation Methods 99</p> <p>3.4.3.1 Suspicion-Based Investigation Methods 99</p> <p>3.4.3.2 The Scope of the Investigation Methods (Article 14) 99</p> <p>3.4.3.3 Conditions and Safeguards (Article 15) 100</p> <p>3.4.3.4 Considerations Relating to Third Parties 102</p> <p>3.4.4 Search and Seizure (Article 19) 103</p> <p>3.4.4.1 Main Rules 103</p> <p>3.4.4.2 Special Issues 104</p> <p>3.4.5 Production Order 106</p> <p>3.4.6 Expedited Preservation and Partial Disclosure of Traffic Data 107</p> <p>3.4.6.1 Real-Time Investigation Methods (Articles 20 and 21) 107</p> <p>3.5 International Cooperation in Order to Collect Digital Evidence 109</p> <p>3.5.1 Narrowing the Focus 109</p> <p>3.5.2 A Special Note on Transborder Access to Digital Evidence 110</p> <p>3.5.3 Mutual Legal Assistance 111</p> <p>3.5.3.1 Basic Principles and Formal Steps of the Procedure 111</p> <p>3.5.3.2 International Conventions Concerning Mutual Legal Assistance 112</p> <p>3.5.4 International Police Cooperation and Joint Investigation Teams 114</p> <p>3.6 Summary 115</p> <p>3.7 Exercises 115</p> <p><b>4 Digital Forensic Readiness 117</b></p> <p><i>Ausra Dilijonaite</i></p> <p>4.1 Introduction 117</p> <p>4.2 Definition 117</p> <p>4.3 Law Enforcement versus Enterprise Digital Forensic Readiness 118</p> <p>4.4 Why? A Rationale for Digital Forensic Readiness 119</p> <p>4.4.1 Cost 119</p> <p>4.4.2 Usefulness of Digital Evidence 120</p> <p>4.4.2.1 Existence of Digital Evidence 121</p> <p>4.4.2.2 Evidentiary Weight of Digital Evidence 121</p> <p>4.5 Frameworks, Standards, and Methodologies 123</p> <p>4.5.1 Standards 124</p> <p>4.5.1.1 ISO/IEC 27037 124</p> <p>4.5.1.2 ISO/IEC 17025 124</p> <p>4.5.1.3 NIST SP 800-86 124</p> <p>4.5.2 Guidelines 124</p> <p>4.5.2.1 IOCE Guidelines 124</p> <p>4.5.2.2 Scientific Working Group on Digital Evidence (SWGDE) 125</p> <p>4.5.2.3 ENFSI Guidelines 125</p> <p>4.5.3 Research 125</p> <p>4.5.3.1 Rowlingson’s Ten-Step Process 125</p> <p>4.5.3.2 Grobler et al.’s Forensic Readiness Framework 125</p> <p>4.5.3.3 Endicott-Popovsky et al.’s Forensic Readiness Framework 126</p> <p>4.6 Becoming “Digital Forensic” Ready 126</p> <p>4.7 Enterprise Digital Forensic Readiness 127</p> <p>4.7.1 Legal Aspects 127</p> <p>4.7.2 Policy, Processes, and Procedures 128</p> <p>4.7.2.1 Risk-Based Approach 128</p> <p>4.7.2.2 Incident Response versus Digital Forensics 130</p> <p>4.7.2.3 Policy 130</p> <p>4.7.2.4 Processes and Procedures 131</p> <p>4.7.3 People 132</p> <p>4.7.3.1 Roles and Responsibilities 132</p> <p>4.7.3.2 Skills, Competencies, and Training 134</p> <p>4.7.3.3 Awareness Training 134</p> <p>4.7.4 Technology: Digital Forensic Laboratory 135</p> <p>4.7.4.1 Accreditation and Certification 135</p> <p>4.7.4.2 Organizational Framework 136</p> <p>4.7.4.3 Security Policy or Framework 136</p> <p>4.7.4.4 Control of Records 136</p> <p>4.7.4.5 Processes, Procedures, and Lab Routines 137</p> <p>4.7.4.6 Methodology and Methods 138</p> <p>4.7.4.7 Personnel 138</p> <p>4.7.4.8 Code of Conduct 138</p> <p>4.7.4.9 Tools 138</p> <p>4.7.5 Technology: Tools and Infrastructure 139</p> <p>4.7.5.1 Sources of the Digital Evidence 139</p> <p>4.7.5.2 Validation and Verification of Digital Forensic Tools 140</p> <p>4.7.5.3 Preparation of Infrastructure 141</p> <p>4.7.6 Outsourcing Digital Forensic Capabilities 142</p> <p>4.7.6.1 Continuous Improvement 143</p> <p>4.8 Considerations for Law Enforcement 144</p> <p>4.9 Summary 145</p> <p>4.10 Exercises 145</p> <p><b>5 Computer Forensics 147</b></p> <p><i>Jeff Hamm</i></p> <p>5.1 Introduction 147</p> <p>5.2 Evidence Collection 148</p> <p>5.2.1 Data Acquisition 149</p> <p>5.2.1.1 Live Data (Including Memory) 150</p> <p>5.2.1.2 Forensic Image 152</p> <p>5.2.2 Forensic Copy 152</p> <p>5.3 Examination 152</p> <p>5.3.1 Disk Structures 153</p> <p>5.3.1.1 Physical Disk Structures 153</p> <p>5.3.1.2 Logical Disk Structures 156</p> <p>5.3.2 File Systems 159</p> <p>5.3.2.1 NTFS (New Technology File System) 163</p> <p>5.3.2.2 INDX (Index) 173</p> <p>5.3.2.3 Orphan Files 174</p> <p>5.3.2.4 EXT2/3/4 (Second, Third, and Fourth Extended Filesystems) 176</p> <p>5.3.2.5 Operating System Artifacts 177</p> <p>5.3.2.6 Linux Distributions 183</p> <p>5.4 Analysis 185</p> <p>5.4.1 Analysis Tools 185</p> <p>5.4.2 Timeline Analysis 186</p> <p>5.4.3 File Hashing 187</p> <p>5.4.4 Filtering 187</p> <p>5.4.5 Data Carving 188</p> <p>5.4.5.1 Files 188</p> <p>5.4.5.2 Records 188</p> <p>5.4.5.3 Index Search 189</p> <p>5.4.6 Memory Analysis 189</p> <p>5.5 Summary 189</p> <p>5.6 Exercises 190</p> <p><b>6 Mobile and Embedded Forensics 191</b></p> <p><i>Jens-Petter Sandvik</i></p> <p>6.1 Introduction 192</p> <p>6.1.1 Embedded Systems and Consumer Electronics 192</p> <p>6.1.2 Mobile Phones 194</p> <p>6.1.2.1 UICC (Formerly Known as a SIM Card) 195</p> <p>6.1.3 Telecommunication Networks 196</p> <p>6.1.3.1 GSM Network 196</p> <p>6.1.3.2 UMTS Networks 198</p> <p>6.1.3.3 Evolved Packet System (EPS)–Long-Term Evolution (LTE) Networks 198</p> <p>6.1.3.4 Evidence in the Mobile Network 199</p> <p>6.1.4 Mobile Devices and Embedded Systems as Evidence 200</p> <p>6.1.5 Malware and Security Considerations 201</p> <p>6.1.6 Ontologies for Mobile and Embedded Forensics 202</p> <p>6.1.6.1 An Acquisition Method Ontology 202</p> <p>6.1.6.2 Technical Qualities 207</p> <p>6.1.6.3 Tools Used for Acquisition 207</p> <p>6.1.6.4 Data Acquisition Methods 208</p> <p>6.2 Collection Phase 208</p> <p>6.2.1 Special Considerations for Embedded Systems and Mobile Devices 209</p> <p>6.2.1.1 Functionality 210</p> <p>6.2.1.2 Stored Data 210</p> <p>6.2.1.3 Storage Media 210</p> <p>6.2.1.4 Security Measures 210</p> <p>6.2.1.5 Communication Ports and Protocols 210</p> <p>6.2.2 Handling Electronics – ESD 210</p> <p>6.2.3 First Contact 212</p> <p>6.2.3.1 Hazards 212</p> <p>6.2.3.2 Preservation of Other Traces 213</p> <p>6.2.3.3 Damages and Unique Characteristics 213</p> <p>6.2.3.4 State and Information 213</p> <p>6.2.3.5 Clock Setting 213</p> <p>6.2.3.6 Investigative Value of Information 213</p> <p>6.2.4 Physical Acquisition 214</p> <p>6.2.4.1 Two Approaches to Physical Acquisition 215</p> <p>6.2.4.2 Chip-Off/In Vitro Acquisition 216</p> <p>6.2.4.3 JTAG/In-System Acquisition 222</p> <p>6.2.5 Logical Acquisition of Data 225</p> <p>6.2.5.1 Manual Inspection 225</p> <p>6.2.5.2 SIM Acquisition 225</p> <p>6.2.5.3 SIM Replacement 228</p> <p>6.2.5.4 Device Backup 228</p> <p>6.2.5.5 USB Mass Storage 229</p> <p>6.2.5.6 Media Transfer Protocol 230</p> <p>6.2.5.7 OBEX 230</p> <p>6.2.5.8 AT Commands 231</p> <p>6.2.5.9 Vendor-Specific Protocols 233</p> <p>6.2.5.10 Android Debug Bridge (ADB) 233</p> <p>6.2.6 Somewhere between Physical and Logical 234</p> <p>6.2.6.1 Root Access 235</p> <p>6.2.6.2 Boot Access 235</p> <p>6.2.6.3 Encryption Keys 237</p> <p>6.2.6.4 Flasher Tools 237</p> <p>6.2.6.5 Chip-Off Continued 238</p> <p>6.2.7 Commercial Forensic Products 240</p> <p>6.2.8 What about RAM? 241</p> <p>6.2.9 Damaged Devices 241</p> <p>6.2.9.1 External Force 242</p> <p>6.2.9.2 Water, Liquids, and Blood 243</p> <p>6.2.10 Wrapping It Up 243</p> <p>6.2.10.1 Matrix of Information Availability 243</p> <p>6.2.10.2 Cheat Sheet 245</p> <p>6.2.10.3 On or Off? 245</p> <p>6.3 Examination Phase 247</p> <p>6.3.1 Top-Down: Flash Translation Layer (FTL) 247</p> <p>6.3.2 Top-Down: Flash File Systems 249</p> <p>6.3.3 Bottom-Up: Carving 250</p> <p>6.3.4 Bottom-Up: Keyword Search 250</p> <p>6.3.5 Technical Deep-Dive: FTL from Nokia 7610 Supernova 251</p> <p>6.3.6 Technical Deep-Dive: Flash File System – YAFFS 252</p> <p>6.3.7 Technical Deep-Dive: Structure – SMS PDU 255</p> <p>6.3.8 Technical Deep-Dive: Structure – SQLite3 Database 261</p> <p>6.3.9 Technical Deep-Dive: Timestamps 265</p> <p>6.4 Reverse Engineering and Analysis of Applications 267</p> <p>6.4.1 Methods 267</p> <p>6.4.1.1 Black Box Testing 267</p> <p>6.4.1.2 Static Code Analysis 268</p> <p>6.4.1.3 Runtime Analysis 268</p> <p>6.4.2 Targets 269</p> <p>6.4.2.1 Program Functionality 269</p> <p>6.4.2.2 Data Structures 269</p> <p>6.4.2.3 Protocols 269</p> <p>6.4.2.4 Encryption 269</p> <p>6.5 Summary 270</p> <p>6.6 Exercises 271</p> <p><b>7 Internet Forensics 275</b></p> <p><i>Petter Christian Bjelland</i></p> <p>7.1 Introduction 275</p> <p>7.2 Computer Networking 276</p> <p>7.3 Layers of Network Abstraction 277</p> <p>7.3.1 The Physical Layer 277</p> <p>7.3.2 The Data Link, Network, and Transport Layers 277</p> <p>7.3.2.1 IP Addresses 278</p> <p>7.3.3 The Session, Presentation, and Application Layers 278</p> <p>7.4 The Internet 279</p> <p>7.4.1 Internet Backbone 279</p> <p>7.4.1.1 Autonomous System (AS) 279</p> <p>7.4.1.2 Border Gateway Protocol (BGP) 280</p> <p>7.4.1.3 Internet Service Providers (ISPs) 281</p> <p>7.4.2 Common Applications 281</p> <p>7.4.2.1 Domain Name System (DNS) 281</p> <p>7.4.2.2 Email 283</p> <p>7.4.2.3 World Wide Web (WWW) 284</p> <p>7.4.2.4 Peer-to-Peer Networks 285</p> <p>7.4.2.5 Other Media 285</p> <p>7.4.3 Caveats 286</p> <p>7.4.3.1 Network Address Translation (NAT) 286</p> <p>7.4.3.2 Onion Routing 287</p> <p>7.4.3.3 Web Shells 288</p> <p>7.5 Tracing Information on the Internet 289</p> <p>7.5.1 DNS and Reverse DNS 289</p> <p>7.5.2 Whois and Reverse Whois 290</p> <p>7.5.3 Ping and Port Scan 290</p> <p>7.5.4 Traceroute 291</p> <p>7.5.5 IP Geolocation 291</p> <p>7.5.6 Tracing BitTorrent Peers 292</p> <p>7.5.7 Bitcoin Unconfirmed Transaction Tracing 293</p> <p>7.6 Collection Phase – Local Acquisition 294</p> <p>7.6.1 Browser History 295</p> <p>7.6.2 Browser Cache 295</p> <p>7.6.3 Browser Cookies 296</p> <p>7.6.4 Email 297</p> <p>7.6.5 Messaging and Chats 297</p> <p>7.6.6 Internet of Things 297</p> <p>7.7 Collection Phase – Network Acquisition 298</p> <p>7.7.1 tcpdump and pcap 298</p> <p>7.7.1.1 Netflow 299</p> <p>7.7.2 DHCP Logs 299</p> <p>7.8 Collection Phase – Remote Acquisition 300</p> <p>7.8.1 Server 300</p> <p>7.8.1.1 Web Server Logs 300</p> <p>7.8.1.2 Web Application Logs 300</p> <p>7.8.1.3 Virtual Hosts 301</p> <p>7.8.2 Cloud Services 301</p> <p>7.8.3 Open Sources 302</p> <p>7.8.3.1 Personal Information 302</p> <p>7.8.3.2 User Accounts 303</p> <p>7.8.3.3 Contact Lists 303</p> <p>7.8.3.4 Publication of Content 303</p> <p>7.8.3.5 Interaction with Content 303</p> <p>7.8.3.6 Public Interaction 304</p> <p>7.8.3.7 Association with Groups and Communities 304</p> <p>7.9 Other Considerations 304</p> <p>7.9.1 Application Programming Interfaces (APIs) 304</p> <p>7.9.1.1 Accessing User Accounts 304</p> <p>7.9.2 Integrity of Remote Artifacts 305</p> <p>7.10 The Examination and Analysis Phases 306</p> <p>7.10.1 Finding Interesting Nodes in Large Networks 306</p> <p>7.10.2 Divide and Conquer Large Networks 307</p> <p>7.10.2.1 Clustering 307</p> <p>7.10.2.2 Community Detection 307</p> <p>7.10.3 Making Sense of Millions of Events 308</p> <p>7.10.3.1 Aggregated Timelines 308</p> <p>7.10.3.2 Temporal Networks 309</p> <p>7.10.3.3 Heat Maps 310</p> <p>7.11 Summary 311</p> <p>7.12 Exercises 312</p> <p><b>8 Challenges in Digital Forensics 313</b></p> <p><i>Katrin Franke and André Årnes</i></p> <p>8.1 Computational Forensics 313</p> <p>8.1.1 The Objectives of Computational Forensics 314</p> <p>8.1.1.1 Large-Scale Investigations 314</p> <p>8.1.1.2 Automation 314</p> <p>8.1.1.3 Analysis 315</p> <p>8.1.1.4 Forensic Soundness 315</p> <p>8.1.2 Disciplines of Computational Forensics 316</p> <p>8.2 Automation and Standardization 316</p> <p>8.3 Research Agenda 317</p> <p>8.4 Summary 317</p> <p><b>9 Educational Guide 319</b></p> <p><i>Stefan Axelsson</i></p> <p>9.1 Teacher’s Guide 319</p> <p>9.2 Student’s Guide 320</p> <p>9.2.1 Journals 320</p> <p>9.2.2 Conferences and Organizations 321</p> <p>9.2.3 Professional and Training Organizations 322</p> <p>9.2.4 Tools 323</p> <p>9.2.5 Corpuses 323</p> <p>9.3 Summary 324</p> <p>References 325</p> <p>Index 333</p>
<p><b> ANDRÉ ÅRNES, PhD</b> is Senior Vice President and Chief Security Office of Telenor Group and an Associate Professor on the faculty of the Norwegian Information Security Laboratory (NisLab) at the Norwegian University of Technology and Science (NTNU). An experienced cyber security expert, Dr. Årnes has extensive experience both as a security leader in a global corporation and as a computer crime special investigator in law enforcement.
<p><b> The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical field </b></p> <p>Written by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab) at the Norwegian University of Science and Technology (NTNU), this textbook takes a scientific approach to digital forensics ideally suited for university courses in digital forensics and information security. Each chapter was written by an accomplished expert in his or her field, many of them with extensive experience in law enforcement and industry.</p> <p>Digital forensics is a key competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. Considering the astonishing pace at which new information technology – and new ways of exploiting information technology – is brought online, researchers and practitioners regularly face new technical challenges, forcing them to continuously upgrade their investigatory skills. Designed to prepare the next generation to rise to those challenges, the material contained in <i>Digital Forensics</i> has been tested and refined by use in both graduate and undergraduate programs and subjected to formal evaluations for more than ten years.</p> <ul> <li>Encompasses all aspects of the field, including methodological, scientific, technical and legal matters</li> <li>Based on the latest research, it provides novel insights for students, including an informed look at the future of digital forensics</li> <li>Includes test questions from actual exam sets, multiple choice questions suitable for online use and numerous visuals, illustrations and case example images</li> <li>Features real-world examples and scenarios, including court cases and technical problems, as well as a rich library of academic references and references to online media</li> </ul> <p><br /><i>Digital Forensics</i> is an excellent introductory text for programs in computer science and computer engineering and for master degree programs in military and police education. It is also a valuable reference for legal practitioners, police officers, investigators, and forensic practitioners seeking to gain a deeper understanding of digital forensics and cybercrime.</p>

Diese Produkte könnten Sie auch interessieren:

Hot-Melt Extrusion
Hot-Melt Extrusion
von: Dennis Douroumis
PDF ebook
136,99 €
Hot-Melt Extrusion
Hot-Melt Extrusion
von: Dennis Douroumis
EPUB ebook
136,99 €
Kunststoffe
Kunststoffe
von: Wilhelm Keim
PDF ebook
99,99 €