Computer Forensics - Michael Sheetz - E-Book

Computer Forensics E-Book

Michael Sheetz

0,0
69,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

Would your company be prepared in the event of: * Computer-driven espionage * A devastating virus attack * A hacker's unauthorized access * A breach of data security? As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks. The first book to successfully speak to the nontechnical professional in the fields of business and law on the topic of computer crime, Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers provides valuable advice on the hidden difficulties that can blindside companies and result in damaging costs. Written by industry expert Michael Sheetz, this important book provides readers with an honest look at the computer crimes that can annoy, interrupt--and devastate--a business. Readers are equipped not only with a solid understanding of how computers facilitate fraud and financial crime, but also how computers can be used to investigate, prosecute, and prevent these crimes. If you want to know how to protect your company from computer crimes but have a limited technical background, this book is for you. Get Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers and get prepared.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 317

Veröffentlichungsjahr: 2015

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Contents

Cover

Contents

Title Page

Copyright

Dedication

Introduction

Acknowledgments

1 A Definition of Computer Forensics

INTRODUCTION

FORENSIC SCIENCE

HISTORY OF COMPUTER FORENSICS

WORLD WIDE WEB

HACKER COMMUNITY

CONCLUSION

NOTES

SUGGESTED READING

2 Basics of Computer Forensic Concepts

INTRODUCTION

UNDERSTANDING DIGITAL EVIDENCE

INPUT

STORAGE

PROCESSING

WHAT COMPUTER DATA IS

OUTPUT

CONCLUSION

NOTES

SUGGESTED READING

3 Preservation and Collection of Digital Evidence

INTRODUCTION

RULES OF EVIDENCE

PRESERVATION

COLLECTION

CONCLUSION

NOTE

SUGGESTED READING

4 Analysis of Digital Evidence

INTRODUCTION

FORENSIC ANALYSIS

CONCLUSION

NOTES

SUGGESTED READING

5 Reporting and Rendering the Opinion

INTRODUCTION

PREPARING THE REPORT

PRESENTATION

TRIAL PROCESS

CONCLUSION

SUGGESTED READING

6 Computer Attacks

HACKERS AND PHREAKZ OH MY

HACKERS: UNAUTHORIZED USE AND TRESPASSING

WIRELESS HACKING

MALWARE

ATTACKS FROM THE INSIDE

CONCLUSION

NOTES

SUGGESTED READING

7 Computers as Tools for Evil

INTRODUCTION

COMPUTERS AND CRIME

IDENTITY THEFT

CONCEALMENT

AUCTION FRAUD AND RETAIL CONS

COUNTERFEITING AND FORGERY

PROSTITUTION

SECURITIES FRAUD

CONCLUSION

NOTES

8 Computer Tools and the Forensic Examination

INTRODUCTION

ASSUMING CONTROL OF THE CASE

UNDERSTANDING THE CASE

EVALUATING THE EVIDENCE

EXAMINING THE ‘’LIVE’’ SYSTEM

COLLECTING DATA FROM A DEAD SYSTEM

IMAGING THE DRIVE

DATA EXTRACTION

DATA ANALYSIS

CONCLUSION

NOTES

9 Presenting Digital Evidence in Court

INTRODUCTION

EVIDENCE

TYPES OF EVIDENCE

EXPERT WITNESSES

LEGAL REQUIREMENTS OF EVIDENCE

SEARCH AND SEIZURE

CONCLUSION

NOTES

Index

Guide

Cover

Table of Contents

Start Reading

List of Exhibit

2 Basics of Computer Forensic Concepts

EXHIBIT 2.1 Example of Hexadecimal Notation

EXHIBIT 2.2 Base-10, Base-2, and Base-16 Renderings of the Same Number

EXHIBIT 2.3 Binary to Hex Conversion

4 Analysis of Digital Evidence

EXHIBIT 4.1 SAMPLE MEMORY BLOCK

EXHIBIT 4.2 REAL-WORLD EXAMPLE OF MEMORY BLOCK

5 Reporting and Rendering the Opinion

EXHIBIT 5.1 PHASES OF CIVIL AND CRIMINAL TRIALS

Pages

iii

iv

v

vi

xi

xii

xiii

xiv

xv

xvi

xvii

xviii

xix

xx

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

COMPUTER FORENSICS

AN ESSENTIAL GUIDE FORACCOUNTANTS, LAWYERS, ANDMANAGERS

MICHAEL SHEETZ

This book is printed on acid-free paper.©

Copyright © 2007 by John Wiley & Sons, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

Published simultaneously in Canada.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print, however, may not be available in electronic format.

For more information about Wiley products, visit our Web site at http://www.wiley.com.

Library of Congress Cataloging-in-Publication Data:

Sheetz, Michael.

Computer forensics : an essential guide for accountants, lawyers, and managers / Michael Sheetz.

p. cm.

Includes index.

ISBN: 978-0-471-78932-1 (cloth)

1. Computer crimes-Investigation. I. Title.

HV8079.C65S44 2007

363.25-dc22

2006030331

Printed in the United States of America.

10987654321

This book is dedicated to my mother and father, whose love andencouragement have given me the confidence to dare to dream, and tothe memory of my grandfather, Benjamin Franklin Sheetz. His love ofthe written word lives on in me.

Introduction

In today's world, few areas of our lives remain untouched by high-tech gadgets and computers. From our automobiles to the ubiquity of e-mail, the world of bits and bytes has overtaken every phase of our lives. While this ceaseless march of the tide of technology has brought wonderful benefits, as with all gains humankind has experienced, it also has brought some side effects.

Although our efficiency has increased, so have the demands for our time. Not only must we learn to multitask, but we must be available 24 hours a day. Tethered to our cell phones, personal digital assistants, and palm-top computers with twenty-first-century umbilical cords, loved ones and coworkers alike experience withdrawal symptoms and panic attacks if their calls and e-mails remain unanswered for more than 10 minutes.

Arguably nowhere has this technological onslaught had a greater impact than in the business world. E-mail, the World Wide Web, and corporate intranets have insinuated themselves into nearly every business. From the mom-and-pop market, which has a digital storefront to augment its brick-and- mortar operation, to the Fortune 500 multinational whose communications hub depends on the infrastructure of the network we call the Internet, digital traffic directs our lives—occasionally into unsightly rush-hour snarls.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!