Computer Forensics: Computer Crime Scene Investigation

  • 15h 4m
  • John R. Vacca
  • Cengage Course PTR
  • 2002

Terrorist attacks are no longer relegated to airports and federal buildings. Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and credit card accounts of unsuspecting individuals. This book provides a complete overview of computer forensics from its definition to “crime scene investigation,” seizure of data, determining the “fingerprints” of the crime, and tracking down the criminal. The book focuses on “solving the crime” rather than information security.

KEY FEATURES

  • Comprehensive overview of the subject from definition to data recovery techniques to auditing methods to terrorist cyber-attacks
  • Case studies and vignettes of actual computer crimes
  • Selected Topics: Computer Forensics Fundamentals; Data Recovery; Evidence Collection And Data Seizure; Duplication And Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Is the U.S. Government Prepared for Information Warfare; The Dark World of the Cyber Underground; Protection against Random Terrorist Information Warfare Tactics: The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Case Studies and Vignettes

About the Author

John Vacca served as a computer security official with NASA, and he has written over 35 books on computer-related topics, including Satellite Encryption (AP), Net Privacy (McG-H), and Electronic Commerce 3/E (CRM).

In this Book

  • Computer Forensics—Computer Crime Scene Investigation
  • Foreword
  • Introduction
  • Computer Forensics Fundamentals
  • Types of Computer Forensics Technology
  • Types of Vendor and Computer Forensics Services
  • Data Recovery
  • Evidence Collection and Data Seizure
  • Duplication and Preservation of Digital Evidence
  • Computer Image Verification and Authentication
  • Discovery of Electronic Evidence
  • Identification of Data
  • Reconstructing Past Events
  • Networks
  • Fighting Against Macro Threats: Defensive Strategies for Governments and Industry Groups
  • The Information Warfare Arsenal and Tactics of the Military
  • The Information Warfare Arsenal and Tactics of Terrorists and Rogues
  • The Information Warfare Arsenal and Tactics of Private Companies
  • Information Warfare: Arsenal of the Future
  • Surveillance Tools for Information Warfare of the Future
  • Civilian Casualties—The Victims and Refugees of Information Warfare
  • Advanced Computer Forensics
  • Summary, Conclusions, and Recommendations
SHOW MORE
FREE ACCESS