69,99 €
Would your company be prepared in the event of: * Computer-driven espionage * A devastating virus attack * A hacker's unauthorized access * A breach of data security? As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks. The first book to successfully speak to the nontechnical professional in the fields of business and law on the topic of computer crime, Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers provides valuable advice on the hidden difficulties that can blindside companies and result in damaging costs. Written by industry expert Michael Sheetz, this important book provides readers with an honest look at the computer crimes that can annoy, interrupt--and devastate--a business. Readers are equipped not only with a solid understanding of how computers facilitate fraud and financial crime, but also how computers can be used to investigate, prosecute, and prevent these crimes. If you want to know how to protect your company from computer crimes but have a limited technical background, this book is for you. Get Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers and get prepared.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 317
Veröffentlichungsjahr: 2015
Cover
Contents
Title Page
Copyright
Dedication
Introduction
Acknowledgments
1 A Definition of Computer Forensics
INTRODUCTION
FORENSIC SCIENCE
HISTORY OF COMPUTER FORENSICS
WORLD WIDE WEB
HACKER COMMUNITY
CONCLUSION
NOTES
SUGGESTED READING
2 Basics of Computer Forensic Concepts
INTRODUCTION
UNDERSTANDING DIGITAL EVIDENCE
INPUT
STORAGE
PROCESSING
WHAT COMPUTER DATA IS
OUTPUT
CONCLUSION
NOTES
SUGGESTED READING
3 Preservation and Collection of Digital Evidence
INTRODUCTION
RULES OF EVIDENCE
PRESERVATION
COLLECTION
CONCLUSION
NOTE
SUGGESTED READING
4 Analysis of Digital Evidence
INTRODUCTION
FORENSIC ANALYSIS
CONCLUSION
NOTES
SUGGESTED READING
5 Reporting and Rendering the Opinion
INTRODUCTION
PREPARING THE REPORT
PRESENTATION
TRIAL PROCESS
CONCLUSION
SUGGESTED READING
6 Computer Attacks
HACKERS AND PHREAKZ OH MY
HACKERS: UNAUTHORIZED USE AND TRESPASSING
WIRELESS HACKING
MALWARE
ATTACKS FROM THE INSIDE
CONCLUSION
NOTES
SUGGESTED READING
7 Computers as Tools for Evil
INTRODUCTION
COMPUTERS AND CRIME
IDENTITY THEFT
CONCEALMENT
AUCTION FRAUD AND RETAIL CONS
COUNTERFEITING AND FORGERY
PROSTITUTION
SECURITIES FRAUD
CONCLUSION
NOTES
8 Computer Tools and the Forensic Examination
INTRODUCTION
ASSUMING CONTROL OF THE CASE
UNDERSTANDING THE CASE
EVALUATING THE EVIDENCE
EXAMINING THE ‘’LIVE’’ SYSTEM
COLLECTING DATA FROM A DEAD SYSTEM
IMAGING THE DRIVE
DATA EXTRACTION
DATA ANALYSIS
CONCLUSION
NOTES
9 Presenting Digital Evidence in Court
INTRODUCTION
EVIDENCE
TYPES OF EVIDENCE
EXPERT WITNESSES
LEGAL REQUIREMENTS OF EVIDENCE
SEARCH AND SEIZURE
CONCLUSION
NOTES
Index
Cover
Table of Contents
Start Reading
2 Basics of Computer Forensic Concepts
EXHIBIT 2.1 Example of Hexadecimal Notation
EXHIBIT 2.2 Base-10, Base-2, and Base-16 Renderings of the Same Number
EXHIBIT 2.3 Binary to Hex Conversion
4 Analysis of Digital Evidence
EXHIBIT 4.1 SAMPLE MEMORY BLOCK
EXHIBIT 4.2 REAL-WORLD EXAMPLE OF MEMORY BLOCK
5 Reporting and Rendering the Opinion
EXHIBIT 5.1 PHASES OF CIVIL AND CRIMINAL TRIALS
iii
iv
v
vi
xi
xii
xiii
xiv
xv
xvi
xvii
xviii
xix
xx
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
MICHAEL SHEETZ
This book is printed on acid-free paper.©
Copyright © 2007 by John Wiley & Sons, Inc. All rights reserved.
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008.
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print, however, may not be available in electronic format.
For more information about Wiley products, visit our Web site at http://www.wiley.com.
Library of Congress Cataloging-in-Publication Data:
Sheetz, Michael.
Computer forensics : an essential guide for accountants, lawyers, and managers / Michael Sheetz.
p. cm.
Includes index.
ISBN: 978-0-471-78932-1 (cloth)
1. Computer crimes-Investigation. I. Title.
HV8079.C65S44 2007
363.25-dc22
2006030331
Printed in the United States of America.
10987654321
This book is dedicated to my mother and father, whose love andencouragement have given me the confidence to dare to dream, and tothe memory of my grandfather, Benjamin Franklin Sheetz. His love ofthe written word lives on in me.
In today's world, few areas of our lives remain untouched by high-tech gadgets and computers. From our automobiles to the ubiquity of e-mail, the world of bits and bytes has overtaken every phase of our lives. While this ceaseless march of the tide of technology has brought wonderful benefits, as with all gains humankind has experienced, it also has brought some side effects.
Although our efficiency has increased, so have the demands for our time. Not only must we learn to multitask, but we must be available 24 hours a day. Tethered to our cell phones, personal digital assistants, and palm-top computers with twenty-first-century umbilical cords, loved ones and coworkers alike experience withdrawal symptoms and panic attacks if their calls and e-mails remain unanswered for more than 10 minutes.
Arguably nowhere has this technological onslaught had a greater impact than in the business world. E-mail, the World Wide Web, and corporate intranets have insinuated themselves into nearly every business. From the mom-and-pop market, which has a digital storefront to augment its brick-and- mortar operation, to the Fortune 500 multinational whose communications hub depends on the infrastructure of the network we call the Internet, digital traffic directs our lives—occasionally into unsightly rush-hour snarls.
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
