Cyber Investigations
- Length: 272 pages
- Edition: 1
- Language: English
- Publisher: Wiley
- Publication Date: 2023-01-04
- ISBN-10: 1119582318
- ISBN-13: 9781119582311
- Sales Rank: #0 (See Top 100 Books)
CYBER INVESTIGATIONS
A classroom tested introduction to cyber investigations with real-life examples included
Cyber Investigations provides an introduction to the topic, an overview of the investigation process applied to cyber investigations, a review of legal aspects of cyber investigations, a review of Internet forensics and open-source intelligence, a research-based chapter on anonymization, and a deep-dive in to multimedia forensics. The content is structured in a consistent manner, with an emphasis on accessibility for students of computer science, information security, law enforcement, and military disciplines.
To aid in reader comprehension and seamless assimilation of the material, real-life examples and student exercises are provided throughout, as well as an Educational Guide for both teachers and students. The material has been classroom-tested and is a perfect fit for most learning environments.
Written by a highly experienced author team with backgrounds in law enforcement, academic research, and industry, sample topics covered in Cyber Investigations include:
- The cyber investigation process, including developing an integrated framework for cyber investigations and principles for the integrated cyber investigation process (ICIP)
- Cyber investigation law, including reasonable grounds to open a criminal cyber investigation and general conditions for privacy-invasive cyber investigation methods
- Perspectives of internet and cryptocurrency investigations, including examples like the proxy seller, the scammer, and the disgruntled employee
- Internet of things (IoT) investigations, including types of events leading to IoT investigations and new forensic challenges in the field
- Multimedia forensics facilitates the understanding of the role of multimedia in investigations, including how to leverage similarity matching, content-based tracing, and media metadata.
- Anonymization networks discusses how such networks work, and how they impact investigations? It addresses aspects of tracing, monitoring, evidence acquisition, de-anonymization, and large investigations
Based on research, teaching material, experiences, and student feedback over several years, Cyber Investigations is ideal for all students and professionals in the cybersecurity industry, providing comprehensive subject coverage from faculty, associates, and former students of cyber security and digital forensics at the Norwegian University of Science and Technology (NTNU).
Cover Title Page Copyright Page Preface Companion Website List of Contributors List of Figures List of Tables List of Examples List of Definitions List of Legal Provisions List of Equations List of Abbreviations 1 Introduction 1.1 Introduction 1.2 Cybercrime and Cybersecurity 1.3 Cyber Investigations 1.4 Challenges in Cyber Investigations 1.5 Further Reading 1.6 Chapter Overview 1.7 Comments on Citation and Notation 1.8 Exercises 2 Cyber Investigation Process 2.1 Introduction 2.2 Investigation as Information Work 2.3 Developing an Integrated Framework for Cyber Investigations 2.4 Principles for the Integrated Cyber Investigation Process (ICIP) 2.5 ICIP's Procedural Stages 2.6 Cognitive and Human Error in Cyber Investigations 2.7 Summary 2.8 Exercises 3 Cyber Investigation Law 3.1 Cyber Investigation in Context 3.2 The Missions and Some Implications to Privacy Rights 3.3 The Different Mandates of the LEA, NIS, and the Police 3.4 Jurisdiction and International Cooperation 3.5 Human Rights in the Context of Cyber Investigations 3.6 The Private Cyber Investigator 3.7 The Way Ahead 3.8 Summary 3.9 Exercises 4 Perspectives of Internet and Cryptocurrency Investigations 4.1 Introduction 4.2 Case Examples 4.3 Networking Essentials 4.4 Networks and Applications 4.5 Open‐Source Intelligence (OSINT) 4.6 Internet Browsers 4.7 Cryptocurrencies 4.8 Preparation for Analysis 4.9 Summary 4.10 Exercises 5 Anonymity and Forensics 5.1 Introduction 5.2 Anonymous Communication Technologies 5.3 Anonymity Investigations 5.4 Summary 5.5 Exercises 6 Internet of Things Investigations 6.1 Introduction 6.2 What Is IoT? 6.3 IoT Investigations 6.4 IoT Forensics 6.5 Summary 6.6 Exercises 7 Multimedia Forensics 7.1 Metadata 7.2 Image Forensics 7.3 Video Forensics 7.4 Audio Forensics 7.5 Summary 7.6 Exercises 8 Educational Guide 8.1 Academic Resources 8.2 Professional and Training Organizations 8.3 Nonacademic Online Resources 8.4 Tools 8.5 Corpora and Data Sets 8.6 Summary References Index End User License Agreement
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.