CVV logo
विद्यया रक्षिता संस्कृतिः सर्वदा।
संस्कृतेर्मानवाः संस्कृता भूरिदा:।।
Knowledge protects culture forever
Cultured people share abundantly.Swami Tejomayananda Founder – Chinmaya Vishwavidyapeeth
CVV logo
L I B R A R Y   O P A C
Amazon cover image
Image from Amazon.com
Image from Google Jackets

Digital Forensic: The Fascinating World of Digital Evidences

By: Contributor(s): Material type: TextTextPublication details: New Delhi Wiley 2017Edition: 1st edDescription: 470ISBN:
  • 9788126565740
Subject(s): DDC classification:
  • 363.25 N59 D 103929
Contents:
Preface Acknowledgements About the Authors 1 Introduction to Computer Crimes 1.1 Introduction to Cybercrime 1.2 Categories of Cybercrimes 1.3 Types of Cybercrimes 1.4 The Internet Spawns Crime 1.5 Worms Versus Viruses 1.6 Role of Computers in Crimes 1.7 Cybercrime Statistics in India 1.8 Prevention of Cybercrime 2 Digital Forensic 2.1 Introduction to Digital Forensic 2.2 History of Forensic 2.3 Rules of Computer/Digital Forensic 2.4 Digital Forensic as a Discipline 2.5 Definition of Digital Forensic 2.6 Digital Forensic Investigations 2.7 Goal of Digital Forensic Investigation 2.8 Various DFI Process/Models/Framework 2.9 Ethical Issues 3 Digital Evidences 3.1 Introduction 3.2 What is Digital Evidence? 3.3 Rules of Digital Evidence 3.4 Characteristics of Digital Evidence 3.5 Types of Evidence 3.6 Challenges in Evidence Handling 3.7 Volatile Evidence 3.8 Evidence Handling Procedures 3.9 Ethical Issues/Legal Principles of Digital Evidence 3.10 Digital Evidence and Metadata 4 Ethical Hacking Methodology and Tools 4.1 Introduction 4.2 Types of Hackers 4.3 Reason for Hacking 4.4 Preventions from Hackers 4.5 Impact of Hacking 4.6 Steps Performed by Hackers 4.7 What is Ethical Hacking? 4.8 Who is an Ethical Hacker? 4.9 Ethical Issues 4.10 Ethical Hacking Process 4.11 Working of an Ethical Hacker 4.12 Identifying Types of Ethical Hacks 4.13 Different Tools for Ethical Hacking 5 Incidence Response Process 5.1 Introduction 5.2 Goals of Incident Response 5.3 People Involved in Incident Response Process 5.4 Incident Response Methodology 5.5 Activities in Initial Response 5.6 Phases after Detection of an Incident 6 Data Collection 6.1 Introduction 6.2 The Facts in a Criminal Case 6.3 People Involved in Data Collection Techniques 6.4 Live Data Collection 6.5 Live Data Collection from Windows System 6.6 Live Data Collection from UNIX System 7 Forensic Duplication 7.1 Introduction to Forensic Duplication 7.2 Rules of Forensic Duplication (Thumb Rule) 7.3 Necessity of Forensic Duplication 7.4 Forensic Duplicates as Admissible Evidence 7.5 Important Terms in Forensic Duplicate 7.6 Forensic Duplication Tool Requirements 7.7 Creating a Forensic Duplicate of a Hard Drive 7.8 Creating a Qualified Forensic Duplicate of a Hard Drive 8 File Systems 8.1 File Systems 8.2 Various Types of File Systems 8.3 Introduction to Storage Layers 8.4 Hard Disk Drive 8.5 Forensic Analysis of File Systems 9 Data Analysis 9.1 Preparation Steps for Forensic Analysis 9.2 Investigating Windows Systems 9.3 Investigating UNIX Systems 9.4 Hacker Tools 10 Network Forensic 10.1 Introduction to Intrusion Detection System 10.2 Types of Intrusion Detection System 10.3 Advantages and Disadvantages of IDS 10.4 Understanding Network Intrusions and Attacks 10.5 Recognizing Pre-Intrusion/Attack Activities 10.6 Port Scans 10.7 Address Spoofing 10.8 Attacking with Trojans, Viruses, and Worms 10.9 Understanding Password Cracking 10.10 Understanding Technical Exploits 10.11 Collecting Network-Based Evidence 10.12 Investigating Routers 10.13 Network Protocols 11 Report Writing 11.1 Goals of Report 11.2 Layout of an Investigative Report 11.3 Guidelines for Writing a Report 12 E-Mail Forensic 12.1 Introduction 12.2 Working of E-Mail 12.3 Steps in the E-Mail Communication 12.4 E-Mail Service Protocols 12.5 Internet Fraud 12.6 Securing Your E-Mail Account 12.7 IP Tracking 12.8 E-Mail Recovery 12.9 E-Mail Forensics Analysis Steps 12.10 E-Mail Forensic Tools 13 Mobile Phone Forensics 13.1 Mobile Hacking—SMS and Call Forging 13.2 Mobile Phone Forensics 13.3 Forensic Procedures 13.4 CIA Triad 13.5 Software and Hardware Mobile Phone Tricks 13.6 Android Forensics 13.7 Mobile Forensic Tools 14 Computer Forensics Tools 14.1 Introduction to Computer Forensics Tools 14.2 Evaluating Computer Forensics Tool Needs 14.3 Types of Computer Forensics Tools 14.4 Tasks Performed by Computer Forensics Tools 14.5 Tool Comparisons 14.6 Computer Forensics Software Tools 14.7 Computer Forensics Hardware Tools 14.8 Various Computer/Digital Forensic Tools 15 Cyber Law 15.1 Introduction to Cyber Laws 15.2 Three Bodies of Law 15.3 Types of Law 15.4 Levels of Law 15.5 Understanding Criminal Culpability 15.6 Level and Burden of Proof 15.7 Laws Related to Computers 15.8 The Indian Penal Code (IPC), 1860 15.9 Code of Criminal Procedure (CrPC), 1973 15.10 Electronic Communication Privacy Act (ECPA) 15.11 Level of Culpability 15.12 Mapping of Cybercrime with IT Act 16 Cloud Forensic 16.1 Introduction to Cloud Forensic 16.2 Three Dimensions of Cloud Forensic 16.3 Usage of Cloud Forensic 16.4 Challenges to Cloud Forensic 16.5 Opportunities 16.6 Impact of Cloud Computing on Digital Forensic 16.7 Cloud Forensic Tools Summary Key Terms Solved Questions Multiple Choice Questions Fill in the Blanks Review Questions Case Study Answer Key Appendix A Lab Experiments Further Reading
Reviews from LibraryThing.com:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Barcode
Books Books Ubhayabharati Computer Science 363.25 N59 D 103929 (Browse shelf(Opens below)) Available 103929

This book is for those who desire to learn more about investigating and fighting digital crimes. It covers latest challenges faced in digital forensic like email forensic, mobile forensic and cloud forensic. It also sequentially explains disk forensic, network forensic, memory forensic, mobile forensic and cloud forensic. The lucid content of the book and the questions provided in each chapter help the learners to prepare themselves for digital forensic competitive exams.

Preface

Acknowledgements

About the Authors



1 Introduction to Computer Crimes

1.1 Introduction to Cybercrime

1.2 Categories of Cybercrimes

1.3 Types of Cybercrimes

1.4 The Internet Spawns Crime

1.5 Worms Versus Viruses

1.6 Role of Computers in Crimes

1.7 Cybercrime Statistics in India

1.8 Prevention of Cybercrime



2 Digital Forensic

2.1 Introduction to Digital Forensic

2.2 History of Forensic

2.3 Rules of Computer/Digital Forensic

2.4 Digital Forensic as a Discipline

2.5 Definition of Digital Forensic

2.6 Digital Forensic Investigations

2.7 Goal of Digital Forensic Investigation

2.8 Various DFI Process/Models/Framework

2.9 Ethical Issues



3 Digital Evidences

3.1 Introduction

3.2 What is Digital Evidence?

3.3 Rules of Digital Evidence

3.4 Characteristics of Digital Evidence

3.5 Types of Evidence

3.6 Challenges in Evidence Handling

3.7 Volatile Evidence

3.8 Evidence Handling Procedures

3.9 Ethical Issues/Legal Principles of Digital Evidence

3.10 Digital Evidence and Metadata



4 Ethical Hacking Methodology and Tools

4.1 Introduction

4.2 Types of Hackers

4.3 Reason for Hacking

4.4 Preventions from Hackers

4.5 Impact of Hacking

4.6 Steps Performed by Hackers

4.7 What is Ethical Hacking?

4.8 Who is an Ethical Hacker?

4.9 Ethical Issues

4.10 Ethical Hacking Process

4.11 Working of an Ethical Hacker

4.12 Identifying Types of Ethical Hacks

4.13 Different Tools for Ethical Hacking



5 Incidence Response Process

5.1 Introduction

5.2 Goals of Incident Response

5.3 People Involved in Incident Response Process

5.4 Incident Response Methodology

5.5 Activities in Initial Response

5.6 Phases after Detection of an Incident



6 Data Collection

6.1 Introduction

6.2 The Facts in a Criminal Case

6.3 People Involved in Data Collection Techniques

6.4 Live Data Collection

6.5 Live Data Collection from Windows System

6.6 Live Data Collection from UNIX System



7 Forensic Duplication

7.1 Introduction to Forensic Duplication

7.2 Rules of Forensic Duplication (Thumb Rule)

7.3 Necessity of Forensic Duplication

7.4 Forensic Duplicates as Admissible Evidence

7.5 Important Terms in Forensic Duplicate

7.6 Forensic Duplication Tool Requirements

7.7 Creating a Forensic Duplicate of a Hard Drive

7.8 Creating a Qualified Forensic Duplicate of a Hard Drive



8 File Systems

8.1 File Systems

8.2 Various Types of File Systems

8.3 Introduction to Storage Layers

8.4 Hard Disk Drive

8.5 Forensic Analysis of File Systems



9 Data Analysis

9.1 Preparation Steps for Forensic Analysis

9.2 Investigating Windows Systems

9.3 Investigating UNIX Systems

9.4 Hacker Tools



10 Network Forensic

10.1 Introduction to Intrusion Detection System

10.2 Types of Intrusion Detection System

10.3 Advantages and Disadvantages of IDS

10.4 Understanding Network Intrusions and Attacks

10.5 Recognizing Pre-Intrusion/Attack Activities

10.6 Port Scans

10.7 Address Spoofing

10.8 Attacking with Trojans, Viruses, and Worms

10.9 Understanding Password Cracking

10.10 Understanding Technical Exploits

10.11 Collecting Network-Based Evidence

10.12 Investigating Routers

10.13 Network Protocols



11 Report Writing

11.1 Goals of Report

11.2 Layout of an Investigative Report

11.3 Guidelines for Writing a Report



12 E-Mail Forensic

12.1 Introduction

12.2 Working of E-Mail

12.3 Steps in the E-Mail Communication

12.4 E-Mail Service Protocols

12.5 Internet Fraud

12.6 Securing Your E-Mail Account

12.7 IP Tracking

12.8 E-Mail Recovery

12.9 E-Mail Forensics Analysis Steps

12.10 E-Mail Forensic Tools



13 Mobile Phone Forensics

13.1 Mobile Hacking—SMS and Call Forging

13.2 Mobile Phone Forensics

13.3 Forensic Procedures

13.4 CIA Triad

13.5 Software and Hardware Mobile Phone Tricks

13.6 Android Forensics

13.7 Mobile Forensic Tools



14 Computer Forensics Tools

14.1 Introduction to Computer Forensics Tools

14.2 Evaluating Computer Forensics Tool Needs

14.3 Types of Computer Forensics Tools

14.4 Tasks Performed by Computer Forensics Tools

14.5 Tool Comparisons

14.6 Computer Forensics Software Tools

14.7 Computer Forensics Hardware Tools

14.8 Various Computer/Digital Forensic Tools



15 Cyber Law

15.1 Introduction to Cyber Laws

15.2 Three Bodies of Law

15.3 Types of Law

15.4 Levels of Law

15.5 Understanding Criminal Culpability

15.6 Level and Burden of Proof

15.7 Laws Related to Computers

15.8 The Indian Penal Code (IPC), 1860

15.9 Code of Criminal Procedure (CrPC), 1973

15.10 Electronic Communication Privacy Act (ECPA)

15.11 Level of Culpability

15.12 Mapping of Cybercrime with IT Act



16 Cloud Forensic

16.1 Introduction to Cloud Forensic

16.2 Three Dimensions of Cloud Forensic

16.3 Usage of Cloud Forensic

16.4 Challenges to Cloud Forensic

16.5 Opportunities

16.6 Impact of Cloud Computing on Digital Forensic

16.7 Cloud Forensic Tools



Summary

Key Terms

Solved Questions

Multiple Choice Questions

Fill in the Blanks

Review Questions

Case Study

Answer Key

Appendix A Lab Experiments

Further Reading

There are no comments on this title.

to post a comment.
Chinmaya Vishwa Vidyapeeth©2022.All rights reserved.
Supported by FOCUZINFOTECH.