Computer And Intrusion Forensics

Hardcover
from $0.00

Author: George Mohay

ISBN-10: 1580533698

ISBN-13: 9781580533690

Category: Databases Security

A comprehensive and broad introduction to computer and intrusion forensics, this practical book helps you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and corporate fraud. The book presents case studies from around the world, and treats key emerging areas such as stego-forensics, image identification, authorship categorization, link discovery and data mining. You also learn the principles and processes for...

Search in google:

Sophisticated computer users may be able to destroy direct evidence of their crimes using computers, but given the proper tools and methods of computer forensics, indirect evidence could be marshaled to reconstruct the crime. This volume describes the nature, history, and current practice in traditional computer forensics (dealing largely with media acquisition and analysis). The authors look at the use of computer forensics in law enforcement and forensic accounting. They also describe the relatively newer field of intrusion detection and forensics, offering case studies and suggesting future research directions. Annotation (c)2003 Book News, Inc., Portland, OR

Computer Crime, Computer Forensics and Computer Security Introduction. Human behaviour in the electronic age. The nature of computer crime. Establishing a case in computer forensics. Legal considerations. Computer security and its relationship to computer forensics. Overview of the following chapters.   Current Practice Introduction. Electronic Evidence. Forensic Tools. Emerging Procedures and Standards. Computer Crime Legislation and Computer Forensics. Networks and Intrusion Forensics.   Computer Forensics in Law Enforcement and National Security The Origins and History of Computer Forensics. The Role of Computer Forensics in Law Enforcement. Principles of Evidence. Computer Forensics Model for Law Enforcement. Forensic Examination. Forensic Resources and Tools. Competencies and Certification. Computer Forensics and National Security.   Computer Forensics in Forensic Accounting Auditing and fraud detection. Defining fraudulent activity. Technology and fraud detection. Fraud Detection Techniques. Visual analysis techniques. Building a fraud analysis model.   Case Studies The Case of "Little Nicky" Scarfo. The Case of `El Griton'. Melissa. The World Trade Centre Bombing and Operation Oplan Bojinka. Other cases.    Intrusion Detection and Intrusion Forensics Intrusion detection, computer forensics and information warfare. Intrusion Detection Systems. Analysing Computer Intrusions. Network Security. Intrusion Forensics . Future Directions for IDS and Intrusion Forensics.   Research Directions and Future Developments Introduction. Forensic Data Mining -- Finding Useful Patterns in Evidence. Text Categorization. Authorship Attribution: Identifying E-mail Authors. Association Rule Mining - Application to Investigative Profiling. Evidence Extraction, Link Analysis and Link Discovery. Stego-Forensic Analysis. Image Mining. Cryptography and Cryptanalysis. The Future - Society and Technology.