Computer crime field guide with tools investigators use, how to use them, and which procedures to follow.
Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location through the Internet in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activities, including identity theft, spam emails and computer viruses. If someone wants to focus and target something, more than likely they will obtain what they want. We shouldn't expect it to be any different in cyberspace.Designed as a field guide for law-enforcement, the Cyber Crime Investigator's Field Guide describes how to investigate a computer crime from beginning to end, covering everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence.
The product includes:
- tools investigators use
- how to use those tools
- which procedures to follow
- questions to ask the client
- evidence collection procedures
- password cracking
- key Unix/Linux commands
- a glossary of commonly used terms
- Cisco firewall data and commands
- attack signatures
- a port number reference
- other items to aid the field investigator in efficiently handling computer security incidents
No comments:
Post a Comment