|
|
xi | |
About the Author |
|
xiii | |
Foreword |
|
xv | |
Acknowledgments |
|
xvii | |
|
|
1 | (8) |
|
Chapter 2 Cybercrime Offenses |
|
|
9 | (20) |
|
Potential Cybercrime Offenses |
|
|
11 | (15) |
|
|
26 | (1) |
|
|
26 | (3) |
|
Chapter 3 Motivations of the Attacker |
|
|
29 | (8) |
|
|
30 | (3) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
35 | (2) |
|
Chapter 4 Determining That a Cybercrime Is Being Committed |
|
|
37 | (10) |
|
|
38 | (3) |
|
|
41 | (3) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (2) |
|
Chapter 5 Commencing a Cybercrime Investigation |
|
|
47 | (6) |
|
Why Investigate a Cybercrime? |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (2) |
|
Is There a Responsibility to Try to Get the Data Back? |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
Chapter 6 Legal Considerations When Planning an Investigation |
|
|
53 | (12) |
|
Role of the Law in a Digital Crimes Investigation |
|
|
54 | (1) |
|
Protecting Digital Evidence |
|
|
55 | (1) |
|
Preservation of the Chain of Custody |
|
|
56 | (3) |
|
|
59 | (1) |
|
Legal Implications of Digital Evidence Collection |
|
|
60 | (3) |
|
|
63 | (1) |
|
|
63 | (2) |
|
Chapter 7 Initial Meeting with the Complainant |
|
|
65 | (12) |
|
|
65 | (3) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
Identifying the Modus Operandi of Attack |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (3) |
|
Chapter 8 Containing and Remediating the Cyber Security Incident |
|
|
77 | (6) |
|
Containing the Cyber Security Incident |
|
|
77 | (3) |
|
Eradicating the Cyber Security Incident |
|
|
80 | (2) |
|
|
82 | (1) |
|
Chapter 9 Challenges in Cyber Security Incident Investigations |
|
|
83 | (10) |
|
|
84 | (7) |
|
|
91 | (2) |
|
Chapter 10 Investigating the Cybercrime Scene |
|
|
93 | (66) |
|
|
96 | (5) |
|
|
101 | (3) |
|
Availability and Management of Evidence |
|
|
104 | (1) |
|
|
105 | (18) |
|
|
123 | (29) |
|
What Could Possibly Go Wrong? |
|
|
152 | (3) |
|
|
155 | (1) |
|
|
156 | (2) |
|
|
158 | (1) |
|
Chapter 11 Log File Identification, Preservation, Collection, and Acquisition |
|
|
159 | (8) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
162 | (2) |
|
|
164 | (1) |
|
|
165 | (2) |
|
Chapter 12 Identifying, Seizing, and Preserving Evidence from Cloud-Computing Platforms |
|
|
167 | (58) |
|
|
167 | (5) |
|
What Is the Relevance to the Investigator? |
|
|
172 | (1) |
|
The Attraction of Cloud Computing for the Cybercriminal |
|
|
173 | (1) |
|
Where Is Your Digital Evidence Located? |
|
|
174 | (1) |
|
Lawful Seizure of Cloud Digital Evidence |
|
|
175 | (2) |
|
Preservation of Cloud Digital Evidence |
|
|
177 | (1) |
|
Forensic Investigations of Cloud-Computing Servers |
|
|
178 | (4) |
|
Remote Forensic Examinations |
|
|
182 | (14) |
|
Cloud Barriers to a Successful Investigation |
|
|
196 | (7) |
|
Suggested Tips to Assist Your Cloud-Based Investigation |
|
|
203 | (3) |
|
Cloud-Computing Investigation Framework |
|
|
206 | (13) |
|
|
219 | (2) |
|
|
221 | (4) |
|
Chapter 13 Identifying, Seizing, and Preserving Evidence from Internet of Things Devices |
|
|
225 | (6) |
|
What Is the Internet of Things? |
|
|
225 | (1) |
|
What Is the Relevance to Your Investigation? |
|
|
226 | (2) |
|
Where Is Your Internet of Things Digital Evidence Located? |
|
|
228 | (1) |
|
Lawful Seizure of Internet of Things Evidence |
|
|
228 | (1) |
|
|
229 | (2) |
|
Chapter 14 Open Source Evidence |
|
|
231 | (6) |
|
The Value of Open Source Evidence |
|
|
231 | (2) |
|
Examples of Open Source Evidence |
|
|
233 | (3) |
|
|
236 | (1) |
|
|
237 | (6) |
|
|
238 | (4) |
|
|
242 | (1) |
|
Chapter 16 Interviewing Witnesses and Suspects |
|
|
243 | (14) |
|
|
245 | (1) |
|
|
246 | (1) |
|
Preparing for an Interview |
|
|
247 | (3) |
|
|
250 | (4) |
|
|
254 | (1) |
|
|
254 | (1) |
|
Preparation of Brief for Referral to Police |
|
|
255 | (2) |
|
Chapter 17 Review of Evidence |
|
|
257 | (8) |
|
Chapter 18 Producing Evidence for Court |
|
|
265 | (8) |
|
Digital Evidence and Its Admissibility |
|
|
267 | (1) |
|
|
268 | (5) |
|
|
273 | (4) |
Glossary |
|
277 | (6) |
Index |
|
283 | |