Investigating internet crimes : an introduction to solving crimes in cyberspace / / Todd Shipley, Art Bowker ; technical editor, Nick Selby |
Autore | Shipley Todd G |
Edizione | [1 Edition.] |
Pubbl/distr/stampa | Waltham, MA : , : Syngress, , [2014] |
Descrizione fisica | 1 online resource (497 p.) |
Disciplina | 363.25/968 |
Altri autori (Persone) |
BowkerArt
SelbyNick |
Soggetto topico | Computer crimes - Investigation |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-407929-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Investigating Internet Crimes; Copyright Page; Contents; Foreword; Preface; About the Authors; About the Technical Editor; Acknowledgments; 1 Introduction to Internet Crime; Defining Internet crime; Internet crime's prevalence; CSI 2010/2011 Computer Crime and Security Survey; NortonTM Cybercrime Report 2011; HTCIA 2011 Report on Cybercrime Investigation; McAfee® Threats Reports; 2012 Data Breach Investigations Report; Internet Crime Compliant Center; Internet harassment; Traditional crimes and the Internet; Investigative responses to Internet crime
Why investigate Internet crime?What is needed to respond to Internet crime?; Continuing investigative problems; Conclusion; Further reading; 2 Internet Criminals; Cybercrime profiling; Inductive profiles; Cybercriminal profiles; Cybersex offenders; Internet harassment; Cyberterrorism and cyberwarfare; Internet Crime Compliant Center; New York Police cyberstalking study; Sex offenders online activities; Capability; Deductive profiling; Conclusion; Further reading; 3 How the Internet Works; A short history of the Internet; The importance of IP addresses; DHCP and assigning addresses MAC addressDomain Name System; DNS records; Internet Protocol Version 6; Defining IPv6; Translating IPv6; Ipv4-Mapped IPv6 addresses; IPv6 DUID; The World Wide Web; Uniform resource locators; Domain name registration; Internationalized domain names; Autonomous system number; Other services on the Internet; File transfer protocol; Email or the SMTP; Post Office Protocol; Internet Message Access Protocol; News groups, Usenet, or the Network News Transfer Protocol; Chatting with IRC; Relevant RFCs; Conclusion; Further reading; 4 Collecting Legally Defensible Online Evidence; Defining evidence Digital versus online evidenceBuilding a foundation; Investigative planning; Investigative components; Authentication; Privacy; Electronic Communications Privacy Act; Wiretap Act (18 U.S.C. 2510-22); Stored Communications Act (18 U.S.C. 2701-12); The Pen/Trap Statute (18 U.S.C. 3127-27); EU Privacy Directive; Fair Credit Reporting Act (15 U.S.C. 1681 et seq.); Mutual legal assistance; General guidance; Conclusion; Further reading; 5 Documenting Online Evidence; Process for documenting online ESI; Collection; Identification; Protocol/application determination; Collection methodology Location identificationPreservation; Presentation; Tools/techniques for documenting Internet evidence; Save As; Pictures and video; Hashing evidence; Collecting entire websites; Authenticating the collected evidence; Validation of online evidence collection tools; Webcase®; Field collection of online ESI; Making an online evidence field collection USB device; Why use FTK imager?; Field process for using the investigative USB device; Collection from Apple Macintosh; Apples in the field; Apple office collection; Organizing your online ESI; The investigative report; Conclusion; Further reading 6 Using Online Investigative Tools |
Record Nr. | UNINA-9910453711403321 |
Shipley Todd G | ||
Waltham, MA : , : Syngress, , [2014] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Investigating internet crimes : an introduction to solving crimes in cyberspace / / Todd G. Shipley, Art Bowker ; technical editor, Nick Selby |
Autore | Shipley Todd G |
Edizione | [1 Edition.] |
Pubbl/distr/stampa | Waltham, MA : , : Syngress, , 2014 |
Descrizione fisica | 1 online resource (xxiii, 472 pages) : illustrations |
Disciplina | 363.25/968 |
Collana | Gale eBooks |
Soggetto topico | Computer crimes - Investigation |
ISBN | 0-12-407929-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Investigating Internet Crimes; Copyright Page; Contents; Foreword; Preface; About the Authors; About the Technical Editor; Acknowledgments; 1 Introduction to Internet Crime; Defining Internet crime; Internet crime's prevalence; CSI 2010/2011 Computer Crime and Security Survey; NortonTM Cybercrime Report 2011; HTCIA 2011 Report on Cybercrime Investigation; McAfee® Threats Reports; 2012 Data Breach Investigations Report; Internet Crime Compliant Center; Internet harassment; Traditional crimes and the Internet; Investigative responses to Internet crime
Why investigate Internet crime?What is needed to respond to Internet crime?; Continuing investigative problems; Conclusion; Further reading; 2 Internet Criminals; Cybercrime profiling; Inductive profiles; Cybercriminal profiles; Cybersex offenders; Internet harassment; Cyberterrorism and cyberwarfare; Internet Crime Compliant Center; New York Police cyberstalking study; Sex offenders online activities; Capability; Deductive profiling; Conclusion; Further reading; 3 How the Internet Works; A short history of the Internet; The importance of IP addresses; DHCP and assigning addresses MAC addressDomain Name System; DNS records; Internet Protocol Version 6; Defining IPv6; Translating IPv6; Ipv4-Mapped IPv6 addresses; IPv6 DUID; The World Wide Web; Uniform resource locators; Domain name registration; Internationalized domain names; Autonomous system number; Other services on the Internet; File transfer protocol; Email or the SMTP; Post Office Protocol; Internet Message Access Protocol; News groups, Usenet, or the Network News Transfer Protocol; Chatting with IRC; Relevant RFCs; Conclusion; Further reading; 4 Collecting Legally Defensible Online Evidence; Defining evidence Digital versus online evidenceBuilding a foundation; Investigative planning; Investigative components; Authentication; Privacy; Electronic Communications Privacy Act; Wiretap Act (18 U.S.C. 2510-22); Stored Communications Act (18 U.S.C. 2701-12); The Pen/Trap Statute (18 U.S.C. 3127-27); EU Privacy Directive; Fair Credit Reporting Act (15 U.S.C. 1681 et seq.); Mutual legal assistance; General guidance; Conclusion; Further reading; 5 Documenting Online Evidence; Process for documenting online ESI; Collection; Identification; Protocol/application determination; Collection methodology Location identificationPreservation; Presentation; Tools/techniques for documenting Internet evidence; Save As; Pictures and video; Hashing evidence; Collecting entire websites; Authenticating the collected evidence; Validation of online evidence collection tools; Webcase®; Field collection of online ESI; Making an online evidence field collection USB device; Why use FTK imager?; Field process for using the investigative USB device; Collection from Apple Macintosh; Apples in the field; Apple office collection; Organizing your online ESI; The investigative report; Conclusion; Further reading 6 Using Online Investigative Tools |
Record Nr. | UNINA-9910790766203321 |
Shipley Todd G | ||
Waltham, MA : , : Syngress, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Investigating internet crimes : an introduction to solving crimes in cyberspace / / Todd G. Shipley, Art Bowker ; technical editor, Nick Selby |
Autore | Shipley Todd G |
Edizione | [1 Edition.] |
Pubbl/distr/stampa | Waltham, MA : , : Syngress, , 2014 |
Descrizione fisica | 1 online resource (xxiii, 472 pages) : illustrations |
Disciplina | 363.25/968 |
Collana | Gale eBooks |
Soggetto topico | Computer crimes - Investigation |
ISBN | 0-12-407929-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Investigating Internet Crimes; Copyright Page; Contents; Foreword; Preface; About the Authors; About the Technical Editor; Acknowledgments; 1 Introduction to Internet Crime; Defining Internet crime; Internet crime's prevalence; CSI 2010/2011 Computer Crime and Security Survey; NortonTM Cybercrime Report 2011; HTCIA 2011 Report on Cybercrime Investigation; McAfee® Threats Reports; 2012 Data Breach Investigations Report; Internet Crime Compliant Center; Internet harassment; Traditional crimes and the Internet; Investigative responses to Internet crime
Why investigate Internet crime?What is needed to respond to Internet crime?; Continuing investigative problems; Conclusion; Further reading; 2 Internet Criminals; Cybercrime profiling; Inductive profiles; Cybercriminal profiles; Cybersex offenders; Internet harassment; Cyberterrorism and cyberwarfare; Internet Crime Compliant Center; New York Police cyberstalking study; Sex offenders online activities; Capability; Deductive profiling; Conclusion; Further reading; 3 How the Internet Works; A short history of the Internet; The importance of IP addresses; DHCP and assigning addresses MAC addressDomain Name System; DNS records; Internet Protocol Version 6; Defining IPv6; Translating IPv6; Ipv4-Mapped IPv6 addresses; IPv6 DUID; The World Wide Web; Uniform resource locators; Domain name registration; Internationalized domain names; Autonomous system number; Other services on the Internet; File transfer protocol; Email or the SMTP; Post Office Protocol; Internet Message Access Protocol; News groups, Usenet, or the Network News Transfer Protocol; Chatting with IRC; Relevant RFCs; Conclusion; Further reading; 4 Collecting Legally Defensible Online Evidence; Defining evidence Digital versus online evidenceBuilding a foundation; Investigative planning; Investigative components; Authentication; Privacy; Electronic Communications Privacy Act; Wiretap Act (18 U.S.C. 2510-22); Stored Communications Act (18 U.S.C. 2701-12); The Pen/Trap Statute (18 U.S.C. 3127-27); EU Privacy Directive; Fair Credit Reporting Act (15 U.S.C. 1681 et seq.); Mutual legal assistance; General guidance; Conclusion; Further reading; 5 Documenting Online Evidence; Process for documenting online ESI; Collection; Identification; Protocol/application determination; Collection methodology Location identificationPreservation; Presentation; Tools/techniques for documenting Internet evidence; Save As; Pictures and video; Hashing evidence; Collecting entire websites; Authenticating the collected evidence; Validation of online evidence collection tools; Webcase®; Field collection of online ESI; Making an online evidence field collection USB device; Why use FTK imager?; Field process for using the investigative USB device; Collection from Apple Macintosh; Apples in the field; Apple office collection; Organizing your online ESI; The investigative report; Conclusion; Further reading 6 Using Online Investigative Tools |
Record Nr. | UNINA-9910823118803321 |
Shipley Todd G | ||
Waltham, MA : , : Syngress, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|