05369nam 2200649 a 450 991045882430332120200520144314.01-281-06022-497866110602200-08-055363-X792502913307(CKB)1000000000383548(EBL)318404(OCoLC)162131558(SSID)ssj0000134249(PQKBManifestationID)11157540(PQKBTitleCode)TC0000134249(PQKBWorkID)10047826(PQKB)10173445(MiAaPQ)EBC318404(CaSebORM)9781597491334(Au-PeEL)EBL318404(CaPaEBR)ebr10201894(CaONFJC)MIL106022(EXLCZ)99100000000038354820070426d2007 uy 0engur|n|---|||||txtccrCyber crime investigations[electronic resource] bridging the gaps between security professionals, law enforcement, and prosecutors /Anthony Reyes ... [et. al]1st editionRockland, MA Syngress Publishingc20071 online resource (433 p.)Includes index.1-59749-133-0 Includes bibliographical references and index.Front Cover; Cyber Crime Investigations: Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors; Copyright Page; Contents; Chapter 1. The Problem at Hand; Introduction; The Gaps in Cyber Crime Law; Unveiling the Myths Behind Cyber Crime; Prioritizing Evidence; Setting the Bar Too High; Summary; Works Referenced; Solutions Fast Track; Frequently Asked Questions; Chapter 2. "Computer Crime" Discussed; Introduction; Examining "Computer Crime" Definitions; Dissecting "Computer Crime"; Using Clear Language to Bridge the Gaps; Summary; Works ReferencedSolutions Fast TrackFrequently Asked Questions; Chapter 3. Preparing for Prosecution and Testifying; Introduction; Common Misconceptions; Chain of Custody; Keys to Effective Testimony; Differences between Civil and Criminal Cases; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Cyber Investigative Roles; Introduction; Understanding Your Role as a Cyber Crime Investigator; The Role of Law Enforcement Officers; The Role of the Prosecuting Attorney; Summary; Solutions Fast Track; Frequently Asked Questions; Works ReferencedChapter 5. Incident Response: Live Forensics and InvestigationsIntroduction; Postmortmem versus Live Forensics; Today's Live Methods; Case Study: Live versus Postmortem; Computer Analysis for the Hacker Defender Program; Network Analysis; Summary; Special Thanks; References; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Legal Issues of Intercepting WiFi Transmissions; Introduction; WiFi Technology; Understanding WiFi RF; Scanning RF; Eavesdropping on WiFi; Fourth Amendment Expectation of Privacy in WLANs; Summary; Works Cited; Solutions Fast Track; Frequently Asked QuestionsChapter 7. Seizure of Digital InformationIntroduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary; Works Cited; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Conducting Cyber Investigations; Introduction; Demystifying Computer/Cyber Crime; Understanding IP Addresses; The Explosion of Networking; The Explosion of Wireless Networks; Interpersonal CommunicationSummarySolutions Fast Track; Frequently Asked Questions; Chapter 9. Digital Forensics and Analyzing Data; Introduction; The Evolution of Computer Forensics; Phases of Digital Forensics; Summary; References; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Cyber Crime Prevention; Introduction; Ways to Prevent Cyber Crime Targeted at You; Ways to Prevent Cyber Crime Targeted at the Family; Ways to Prevent Cyber Crime Targeted at Personal Property; Ways to Prevent Cyber Crime Targeted at a Business; Ways to Prevent Cyber Crime Targeted at an OrganizationWays to Prevent Cyber Crime Targeted at a Government AgencyWritten by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.The book begins with the chapter "What is Cyber Crime?? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not onlComputer crimesInvestigationElectronic books.Computer crimesInvestigation.363.25/968Reyes Anthony880204MiAaPQMiAaPQMiAaPQBOOK9910458824303321Cyber crime investigations1965322UNINA