1.

Record Nr.

UNINA9910583479203321

Autore

Choo Kim-Kwang

Titolo

Contemporary digital forensic investigations of cloud and mobile applications / / edited by Kim-Kwang Raymond Choo, University of Texas at San Antonio, San Antonio, TX, United States, University of South Australia, Adelaide, SA, Australia, Ali Dehghantanha, University of Salford, Salford, United Kingdom

Pubbl/distr/stampa

Cambridge, MA : , : Syngress, , [2017]

�2017

ISBN

0-12-805448-4

Edizione

[First edition.]

Descrizione fisica

1 online resource (xi, 313 pages) : illustrations (chiefly color), maps

Collana

Syngress advanced topics in information security

Disciplina

004.6782

Soggetti

Computer crimes - Investigation

Forensic sciences

Mobile communication systems

Cloud computing

Mobile computing

Mobile device forensics

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references at the end of each chapters and index.

Nota di contenuto

Contemporary digital forensics investigations of cloud and mobile applications / K.-K.R. Choo, A. Dehghantanha -- Forensics analysis of Android mobile VoIP apps / T. Dargahi, A. Dehghantanha, M. Conti -- Investigating America Online instant messaging application : data remnants on Windows 8.1 client machine / T.Y. Yang, A. Dehghantanha, K.-K.R. Choo, Z. Muda -- Forensic investigation of social media and instant messaging services in Firefox OS : Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies / M.N. Yusoff, A. Dehghantanha, R. Mahmod -- Network traffic forensics on Firefox Mobile OS : Facebook, Twitter, and Telegram as case studies / M.N. Yusoff, A. Dehghantanha, R. Mahmod -- Mobile phone forensics : an investigative framework based on user impulsivity and secure collaboration errors / M. Petraityte, A. Dehghantanha, G. Epiphaniou --



Performance of Android forensics data recovery tools / B.C. Ogazi-Onyemaechi, A. Dehghantanha, K.-K.R. Choo -- Honeypots for employee information security awareness and education training : a conceptual EASY training model / L. Christopher, K.-K.R. Choo, A. Dehghantanha -- Implications of emerging technologies to incident handling and digital forensic strategies : a routine activity theory / N.H. Ab Rahman, G.C. Kessler, K.-K.R. Choo -- Forensic readiness : a case study on digital CCTV systems antiforensics / A. Ariffin, K.-K.R. Choo, Z. Yunos -- Forensic visualization : survey and future research directions / C. Tassone, B. Martini, K.-K.R. Choo -- Investigating storage as a service cloud platform : pCloud as a case study / T. Dargahi, A. Dehghantanha, M. Conti -- Cloud storage forensics : analysis of data remnants on SpiderOak, JustCloud, and pCloud / S.H. Mohtasebi, A. Dehghantanha, K.-K.R. Choo -- Residual cloud forensics : CloudMe and 360Yunpan as case studies / A. Dehghantanha, T. Dargahi -- An Android Cloud storage apps forensic taxonomy / M. Amine Chelihi, A. Elutilo, I. Ahmed, C. Papadopoulos, A. Dehghantanha.

Sommario/riassunto

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices. This is the first book that covers the investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized research, led research, and been published widely in the field. Users will gain a deep overview of seminal research in the field while also identifying prospective future research topics and open challenges. Presents the most current, leading edge research on cloud and mobile application forensics, featuring a panel of top experts in the field Introduces the first book to provide an in-depth overview of the issues surrounding digital forensic investigations in cloud and associated mobile apps Covers key technical topics and provides readers with a complete understanding of the most current research findings Includes discussions on future research directions and challenges



2.

Record Nr.

UNINA9911006680103321

Autore

Mustard Steve

Titolo

A Guide to Cybersecurity for Water and Wastewater Utilities

Pubbl/distr/stampa

Chicago : , : Water Environment Federation, , 2024

©2024

ISBN

9781523161775

1523161779

9781572784727

1572784725

Edizione

[1st ed.]

Descrizione fisica

1 online resource (131 pages)

Soggetti

Computer security

Water utilities

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Cover -- Title Page -- Copyright -- Dedication -- Contents -- List of Figures -- List of Tables -- Acknowledgments -- About the Author -- Chapter 1 Introduction --   1.0 Cybersecurity In The Water and Wastewater Sector --   2.0 About This Book -- Chapter 2 The Cybersecurity Risk to Water and Wastewater Utilities --   1.0 Introduction --   2.0 Reported Incidents In The Water and Wastewater Sector --   3.0 Cybersecurity Incidents In Water and Wastewater Utilities --     3.1 Contributing Factors --     3.2 Consequences --     3.3 Threats and Exploits --       3.3.1 Amateur Hackers --       3.3.2 Professional Hackers --       3.3.3 Activist Hackers --       3.3.4 Disgruntled Employees or Contractors --       3.3.5 Nation-States and Terrorists --       3.3.6 Unintentional Acts --     3.4 Vulnerabilities --       3.4.1 Technical Vulnerabilities --       3.4.2 Process Vulnerabilities --       3.4.3 People Vulnerabilities --         3.4.3.1 Phishing

Sommario/riassunto

This publication by the Water Environment Federation focuses on the cybersecurity risks and management strategies for water and wastewater utilities. It provides a comprehensive review of technical practices and detailed procedures to enhance cybersecurity in the water sector. The book covers various aspects including risk assessment,



mitigation barriers, awareness and culture, and dealing with third-party contracts. It is intended as a resource for water quality professionals, engineers, and policymakers aiming to protect critical infrastructure from cyber threats. The text emphasizes the importance of securing water services, which are vital to public health and safety, and offers insights into improving cybersecurity resilience through best practices and continuous education.