gogogo
Syndetics cover image
Image from Syndetics

Scene of the cybercrime : computer forensics handbook / Debra Littlejohn Shinder; Ed Tittel, technical editor.

By: Contributor(s): Material type: TextTextSeries: Syngress Shinder booksPublication details: Rockland, Mass.; [Great Britain] : Syngress Publishing, c2002.Description: xxxi, 718p. : ill.; 24cmISBN:
  • 1931836655
Subject(s): DDC classification:
  • 005.8 SHI
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Moylish Library Main Collection 005.8 SHI (Browse shelf(Opens below)) 1 Available 39002000394628

Enhanced descriptions from Syndetics:

"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of Europe
Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology.

This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime.

Includes index.

Table of contents provided by Syndetics

  • Foreword (p. xxv)
  • Chapter 1 Facing the Cybercrime Problem Head On (p. 1)
  • Introduction (p. 2)
  • Quantifying the Crisis (p. 3)
  • Defining Cybercrime (p. 4)
  • Moving from the General to the Specific (p. 5)
  • Understanding the Importance of Jurisdictional Issues (p. 6)
  • Differentiating Crimes That Use the Net from Crimes That Depend on the Net (p. 10)
  • Collecting Statistical Data on Cybercrime (p. 11)
  • Toward a Working Definition of Cybercrime (p. 15)
  • Categorizing Cybercrime (p. 18)
  • Developing Categories of Cybercrimes (p. 19)
  • Prioritizing Cybercrime Enforcement (p. 33)
  • Fighting Cybercrime (p. 35)
  • Determining Who Will Fight Cybercrime (p. 35)
  • Educating Cybercrime Fighters (p. 37)
  • Getting Creative in the Fight Against Cybercrime (p. 41)
  • Summary (p. 45)
  • Frequently Asked Questions (p. 46)
  • Resources (p. 47)
  • Chapter 2 Reviewing the History of Cybercrime (p. 49)
  • Introduction (p. 50)
  • Exploring Criminality in the Days of Standalone Computers (p. 51)
  • Sharing More Than Time (p. 52)
  • The Evolution of a Word (p. 52)
  • Understanding Early Phreakers, Hackers, and Crackers (p. 53)
  • Hacking Ma Bell's Phone Network (p. 53)
  • Living on the LAN: Early Computer Network Hackers (p. 55)
  • How BBSs Fostered Criminal Behavior (p. 56)
  • How Online Services Made Cybercrime Easy (p. 57)
  • Introducing the ARPANet:: the Wild West of Networking (p. 58)
  • Sputnik Inspires ARPA (p. 59)
  • ARPA Turns Its Talents to Computer Technology (p. 59)
  • Network Applications Come into Their Own (p. 60)
  • The Internetwork Continues to Expand (p. 60)
  • Watching Crime Rise with the Commercialization of the Internet (p. 61)
  • Bringing the Cybercrime Story Up to Date (p. 62)
  • Understanding How New Technologies Create New Vulnerabilities (p. 62)
  • Planning for the Future: How to Thwart Tomorrow's Cybercriminal (p. 88)
  • Summary (p. 89)
  • Frequently Asked Questions (p. 90)
  • Resources (p. 91)
  • Chapter 3 Understanding the People on the Scene (p. 93)
  • Introduction (p. 94)
  • Understanding Cybercriminals (p. 96)
  • Profiling Cybercriminals (p. 98)
  • Categorizing Cybercriminals (p. 119)
  • Understanding Cybervictims (p. 129)
  • Understanding Cyberinvestigators (p. 136)
  • Facilitating Cooperation: CEOs on the Scene (p. 140)
  • Summary (p. 142)
  • Frequently Asked Questions (p. 143)
  • Resources (p. 145)
  • Chapter 4 Understanding Computer Basics (p. 147)
  • Introduction (p. 148)
  • Understanding Computer Hardware (p. 149)
  • Looking Inside the Machine (p. 150)
  • The Language of the Machine (p. 164)
  • Wandering Through a World of Numbers (p. 165)
  • Understanding the Binary Numbering System (p. 166)
  • Encoding Nontext Files (p. 169)
  • Why This Matters to the Investigator (p. 169)
  • Understanding Computer Operating Systems (p. 171)
  • Understanding the Role of the Operating System Software (p. 172)
  • Differentiating Between Multitasking and Multiprocessing Types (p. 173)
  • Differentiating Between Proprietary and Open Source Operating Systems (p. 175)
  • An Overview of Commonly Used Operating Systems (p. 177)
  • Understanding File Systems (p. 193)
  • Summary (p. 197)
  • Frequently Asked Questions (p. 198)
  • Resources (p. 199)
  • Chapter 5 Understanding Networking Basics (p. 201)
  • Introduction (p. 202)
  • Understanding How Computers Communicate on a Network (p. 203)
  • Sending Bits and Bytes Across a Network (p. 204)
  • Understanding Networking Models and Standards (p. 215)
  • Understanding Network Hardware (p. 221)
  • Understanding Network Software (p. 231)
  • Understanding the TCP/IP Protocols Used on the Internet (p. 240)
  • Summary (p. 273)
  • Frequently Asked Questions (p. 274)
  • Resources (p. 277)
  • Chapter 6 Understanding Network Intrusions and Attacks (p. 279)
  • Introduction (p. 280)
  • Understanding Network Intrusions and Attacks (p. 282)
  • Intrusions vs. Attacks (p. 283)
  • Recognizing Direct vs. Distributed Attacks (p. 284)
  • Automated Attacks (p. 286)
  • Accidental "Attacks" (p. 287)
  • Preventing Intentional Internal Security Breaches (p. 288)
  • Preventing Unauthorized External Intrusions (p. 289)
  • Recognizing the "Fact of the Attack" (p. 291)
  • Identifying and Categorizing Attack Types (p. 292)
  • Recognizing Pre-intrusion/Attack Activities (p. 292)
  • Port Scans (p. 294)
  • Address Spoofing (p. 297)
  • Placement of Trojans (p. 300)
  • Placement of Tracking Devices and Software (p. 300)
  • Placement of Packet Capture and Protocol Analyzer Software (p. 302)
  • Prevention and Response (p. 304)
  • Understanding Password Cracking (p. 305)
  • Brute Force (p. 306)
  • Exploitation of Stored Passwords (p. 309)
  • Interception of Passwords (p. 311)
  • Password Decryption Software (p. 312)
  • Social Engineering (p. 313)
  • Prevention and Response (p. 314)
  • Understanding Technical Exploits (p. 315)
  • Protocol Exploits (p. 316)
  • Application Exploits (p. 324)
  • Operating System Exploits (p. 329)
  • Prevention and Response (p. 333)
  • Attacking with Trojans, Viruses, and Worms (p. 334)
  • Trojans (p. 336)
  • Viruses (p. 337)
  • Worms (p. 338)
  • Prevention and Response (p. 339)
  • Hacking for Nontechies (p. 340)
  • The Script Kiddie Phenomenon (p. 340)
  • The "Point and Click" Hacker (p. 341)
  • Prevention and Response (p. 342)
  • Summary (p. 343)
  • Frequently Asked Questions (p. 344)
  • Resources (p. 346)
  • Chapter 7 Understanding Cybercrime Prevention (p. 349)
  • Introduction (p. 350)
  • Understanding Network Security Concepts (p. 351)
  • Applying Security Planning Basics (p. 352)
  • Talking the Talk: Security Terminology (p. 355)
  • Importance of Physical Security (p. 357)
  • Understanding Basic Cryptography Concepts (p. 364)
  • Understanding the Purposes of Cryptographic Security (p. 364)
  • Basic Cryptography Concepts (p. 373)
  • Making the Most of Hardware and Software Security (p. 387)
  • Implementing Hardware-Based Security (p. 387)
  • Implementing Software-Based Security (p. 391)
  • Understanding Firewalls (p. 394)
  • How Firewalls Use Layered Filtering (p. 395)
  • Integrated Intrusion Detection (p. 398)
  • Forming an Incident Response Team (p. 398)
  • Designing and Implementing Security Policies (p. 401)
  • Understanding Policy-Based Security (p. 401)
  • Evaluating Security Needs (p. 404)
  • Complying with Security Standards (p. 415)
  • Defining Policy Areas (p. 417)
  • Developing the Policy Document (p. 421)
  • Educating Network Users on Security Issues (p. 425)
  • Summary (p. 427)
  • Frequently Asked Questions (p. 428)
  • Resources (p. 430)
  • Chapter 8 Implementing System Security (p. 431)
  • Introduction (p. 432)
  • How Can Systems Be Secured? (p. 433)
  • The Security Mentality (p. 433)
  • Elements of System Security (p. 435)
  • Implementing Broadband Security Measures (p. 436)
  • Broadband Security Issues (p. 439)
  • Deploying Antivirus Software (p. 441)
  • Defining Strong User Passwords (p. 444)
  • Setting Access Permissions (p. 444)
  • Disabling File and Print Sharing (p. 445)
  • Using NAT (p. 446)
  • Deploying a Firewall (p. 448)
  • Disabling Unneeded Services (p. 449)
  • Configuring System Auditing (p. 449)
  • Implementing Browser and E-Mail Security (p. 452)
  • Types of Dangerous Code (p. 454)
  • Making Browsers and E-Mail Clients More Secure (p. 456)
  • Securing Web Browser Software (p. 458)
  • Securing Netscape Navigator (p. 462)
  • Securing Opera (p. 464)
  • Implementing Web Server Security (p. 465)
  • DMZ vs. Stronghold (p. 466)
  • Isolating the Web Server (p. 467)
  • Web Server Lockdown (p. 468)
  • Maintaining Integrity (p. 470)
  • Rogue Web Servers (p. 471)
  • Understanding Security and Microsoft Operating Systems (p. 471)
  • General Microsoft Security Issues (p. 472)
  • Securing Windows 9x Computers (p. 475)
  • Understanding Security and UNIX/Linux Operating Systems (p. 483)
  • Understanding Security and Macintosh Operating Systems (p. 487)
  • Understanding Mainframe Security (p. 489)
  • Understanding Wireless Security (p. 490)
  • Summary (p. 493)
  • Frequently Asked Questions (p. 494)
  • Resources (p. 495)
  • Chapter 9 Implementing Cybercrime Detection Techniques (p. 499)
  • Introduction (p. 500)
  • Security Auditing and Log Files (p. 502)
  • Auditing for Windows Platforms (p. 503)
  • Auditing for UNIX and Linux Platforms (p. 508)
  • Firewall Logs, Reports, Alarms, and Alerts (p. 510)
  • Understanding E-Mail Headers (p. 516)
  • Tracing a Domain Name or IP Address (p. 522)
  • Commercial Intrusion Detection Systems (p. 524)
  • Characterizing Intrusion Detection Systems (p. 525)
  • Commercial IDS Players (p. 530)
  • IP Spoofing and Other Antidetection Tactics (p. 532)
  • Honeypots, Honeynets, and Other "Cyberstings" (p. 533)
  • Summary (p. 536)
  • Frequently Asked Questions (p. 539)
  • Resources (p. 542)
  • Chapter 10 Collecting and Preserving Digital Evidence (p. 545)
  • Introduction (p. 546)
  • Understanding the Role of Evidence in a Criminal Case (p. 548)
  • Defining Evidence (p. 549)
  • Admissibility of Evidence (p. 551)
  • Forensic Examination Standards (p. 552)
  • Collecting Digital Evidence (p. 552)
  • The Role of First Responders (p. 553)
  • The Role of Investigators (p. 554)
  • The Role of Crime Scene Technicians (p. 555)
  • Preserving Digital Evidence (p. 558)
  • Preserving Volatile Data (p. 559)
  • Disk Imaging (p. 560)
  • "Snapshot" Tools and File Copying (p. 563)
  • Special Considerations (p. 564)
  • Recovering Digital Evidence (p. 566)
  • Recovering "Deleted" and "Erased" Data (p. 567)
  • Decrypting Encrypted Data (p. 568)
  • Finding Hidden Data (p. 568)
  • Locating Forgotten Evidence (p. 572)
  • Recovering Data from Backups (p. 577)
  • Defeating Data Recovery Techniques (p. 578)
  • Documenting Evidence (p. 581)
  • Evidence Tagging and Marking (p. 581)
  • Evidence Logs (p. 581)
  • Documenting Evidence Analysis (p. 582)
  • Documenting the Chain of Custody (p. 583)
  • Computer Forensics Resources (p. 583)
  • Understanding Legal Issues (p. 587)
  • Searching and Seizing Digital Evidence (p. 588)
  • Privacy Laws (p. 598)
  • The Effects of the U.S. Patriot Act (p. 599)
  • Summary (p. 602)
  • Frequently Asked Questions (p. 603)
  • Resources (p. 605)
  • Chapter 11 Building the Cybercrime Case (p. 607)
  • Introduction (p. 608)
  • Major Factors Complicating Prosecution (p. 609)
  • Difficulty of Defining the Crime (p. 609)
  • Jurisdictional Issues (p. 626)
  • The Nature of the Evidence (p. 632)
  • Human Factors (p. 633)
  • Overcoming Obstacles to Effective Prosecution (p. 636)
  • The Investigative Process (p. 637)
  • Testifying in a Cybercrime Case (p. 650)
  • Summary (p. 656)
  • Frequently Asked Questions (p. 657)
  • Resources (p. 658)
  • Afterword (p. 659)
  • Appendix (p. 663)
  • Index (p. 699)

Powered by Koha