- Browse
- » Computer forensics: cybercriminals, laws, and evidence
Computer forensics: cybercriminals, laws, and evidence
Author
Publisher
Jones & Bartlett Learning
Publication Date
2012
Language
English
Description
Loading Description...
Table of Contents
From the Book
Preface
Acknowledgments
Chapter 1: Entering The World Of Cybercrime
Cybercrime: defined
Cybercrime versus traditional crime
Cybercrime categories
Combating cybercrime
Chapter summary
Key terms
Practical exercise
Critical thinking question
Review questions
Footnotes
Chapter 2: Introduction To Computer Forensics Investigations And Electronic Evidence
Computer Forensics: what is it?
Computer forensics investigations: the basics
Computer forensics investigations: a four-step process
Electronic evidence: what is it?
Types of evidence
Authentication of evidence
Standards of evidence
Chapter summary
Key terms
Practical exercise
Review questions
Footnotes
Chapter 3: Laws Regulating Access To Electronic Evidence
Telecommunications and electronic communications data
Statutory background of privacy protection and government access to data
Chapter summary
Key terms
Practical exercise
Critical thinking questions
Review questions
Footnotes
Chapter 4: Searches And Seizures Of Computers And Electronic Evidence
What is privacy and why is it important?
Constitutional source of privacy protection: the Fourth Amendment
Searches warrants
Searching the computer for evidence
Chapter summary
Key terms
Critical thinking questions
Review questions
Footnotes
Chapter 5: Cybercrime Laws: Which Statute For Which Crime?
Computer threats and intrusions
Financial crimes and fraud
Intellectual property theft and economic espionage
Personal crimes
Chapter summary
Key terms
Critical thinking questions
Review questions
Footnotes
Chapter 6: Understanding The Computer-Networking Environment: Beware Of The Scam Artists, Bullies, And Lurking Predators!
Scams and scam artists
Identity theft
Cyberbullying
Child exploitation online
Chapter summary
Key terms
Practical exercise
Review questions
Footnotes
Chapter 7: Where Is The Electronic Evidence And Which Tools Can We Use To Find It?
Location of electronic evidence
Tools used to search and collect electronic evidence
Chapter summary
Key terms
Practical exercises
Critical thinking question
Review questions
Footnotes
Chapter 8: Crime And Incident Scene: What Should An Investigator Do?
Conducting and investigation
Special considerations for cybercrime investigations
Identifying evidence
Analysis of evidence
How to handle evidence in an investigation
Hypothetical criminal investigation
Extracting electronic evidence
Chapter summary
Key terms
Critical thinking questions
Review questions
Footnotes
Chapter 9: Corporate Crimes And Policy Violations Involving Computers: How To Conduct A Corporate Investigation
Corporate investigations
Corporate criminal activities and policy violations
Preparing for the investigation
Conducting the investigation
Chapter summary
Key terms
Review questions
Footnotes
Chapter 10: E-mail Forensics
Importance of e-mail investigations
E-mail: the basics
How to conduct an E-mail investigation
Problems encountered by computer forensics investigators
Chapter summary
Key terms
Practical thinking question
Review questions
Footnotes
Chapter 11: Network Forensics: An Introduction
Stand-alone versus networked devices
Computer networks
Network components
Where can network-related evidence be found?
Network forensics analysis tools
Special issues when conducting investigations in a networked environment
Preliminary analysis
Documentation and collection
Analysis and preservation
Chapter summary
Key terms
Review questions
Footnotes
Chapter 12: Mobile Phones And PDAs In Computer Forensics Investigations
Role of mobile phones and PDAs
Mobile phones and PDAs versus other electronic devices
Which tools can be used to retrieve evidence?
Mobile phone and PDA investigations
Chapter summary
Key terms
Practical exercise
Critical thinking questions
Review questions
Footnotes
Chapter 13: Pretrial And Courtroom Experiences Of A Computer Forensics Investigator
Pretrial procedures
Testimony and rules of evidence
Role of the computer forensics investigator in pretrial proceedings and court
Chapter summary
Key terms
Critical thinking questions
Footnotes
Glossary
Index
Excerpt
Loading Excerpt...
Author Notes
Loading Author Notes...
More Details
ISBN
9781449600723
Staff View
Loading Staff View.

