Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.The book begins with the chapter What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only will these topics be generally be discussed and explained for the novice, but the hard questions the questions that have the power to divide this community will also be examined in a comprehensive and thoughtful manner.This book will serve as a foundational text for the cyber crime community to begin to move past current difficulties into its next evolution.* This book has been written by a retired NYPD cyber cop, who has worked many high-profile computer crime cases* Discusses the complex relationship between the public and private sector with regards to cyber crime* Provides essential information for IT security professionals and first responders on maintaining chain of evidence"
Author(s): Anthony Reyes, Richard Brittson, Kevin O'Shea, James Steele
Publisher: Syngress Publishing
Year: 2007
Language: English
Pages: 434
City: Rockland, MA
Cover......Page 1
Contents......Page 13
The Problem at Hand......Page 23
“Computer Crime” Discussed......Page 45
Preparing for Prosecution and Testifying......Page 71
Cyber Investigative Roles......Page 91
Incident Response: Live Forensics and Investigations......Page 111
Legal Issues of Intercepting WiFi Transmissions......Page 133
Seizure of Digital Information......Page 155
Conducting Cyber
Investigations......Page 215
Digital Forensics and Analyzing Data......Page 241
Cyber Crime Prevention......Page 283
Legal Principles for Information Security Evaluations1......Page 307
Investigating Insider Threat Using Enterprise Security Management......Page 373
Index......Page 421