Contemporary Digital Forensic Investigations of Cloud and Mobile Applications - 1st Edition - ISBN: 9780128053034, 9780128054482

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

1st Edition

Editors: Kim-Kwang Raymond Choo Ali Dehghantanha
eBook ISBN: 9780128054482
Paperback ISBN: 9780128053034
Imprint: Syngress
Published Date: 12th October 2016
Page Count: 326
Tax/VAT will be calculated at check-out Price includes VAT (GST)
20% off
20% off
20% off
20% off
107.23
85.78
60.99
48.79
71.95
57.56
99.95
79.96
Unavailable
Price includes VAT (GST)
DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices.

This is the first book that covers the investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized research, led research, and been published widely in the field. Users will gain a deep overview of seminal research in the field while also identifying prospective future research topics and open challenges.

Key Features

  • Presents the most current, leading edge research on cloud and mobile application forensics, featuring a panel of top experts in the field
  • Introduces the first book to provide an in-depth overview of the issues surrounding digital forensic investigations in cloud and associated mobile apps
  • Covers key technical topics and provides readers with a complete understanding of the most current research findings
  • Includes discussions on future research directions and challenges

Readership

Mobile security and privacy research communities and practitioner communities. Information Security professionals, digital forensic analysts, researchers, and practitioners, as well as university students in digital forensics programs

Table of Contents

  • About the Editors
  • Chapter 1: Contemporary Digital Forensics Investigations of Cloud and Mobile Applications
    • Abstract
  • Chapter 2: Forensics Analysis of Android Mobile VoIP Apps
    • Abstract
    • 1 Introduction
    • 2 Related Work
    • 3 Experimental Setup
    • 4 Results and Discussion
    • 5 Conclusion and Future Work
  • Chapter 3: Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine
    • Abstract
    • 1 Introduction
    • 2 Related Work
    • 3 Research Methodology
    • 4 AIM Forensics
    • 5 Conclusion and Future Work
  • Chapter 4: Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies
    • Abstract
    • 1 Introduction
    • 2 Methodology
    • 3 Experiment Setup
    • 4 Discussion and Analysis
    • 5 Conclusion
  • Chapter 5: Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies
    • Abstract
    • 1 Introduction
    • 2 Experiment Setup
    • 3 Discussion and Analysis
    • 4 Conclusion and Future Works
  • Chapter 6: Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors
    • Abstract
    • 1 Introduction
    • 2 Review of Related Work
    • 3 Experiment Design
    • 4 Results and Discussion
    • 5 Forensics Investigation Guideline
    • 6 Limitations
    • 7 Conclusion and Further Research
  • Chapter 7: Performance of Android Forensics Data Recovery Tools
    • Abstract
    • 1 Introduction
    • 2 Related Work
    • 3 Experiment Setup
    • 4 Results and Discussions
    • 5 Conclusion and Future Works
  • Chapter 8: Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model
    • Abstract
    • Acknowledgments
    • 1 Introduction
    • 2 Experiment Setup
    • 3 Findings: Dionaea
    • 4 Findings: Kippo
    • 5 A Conceptual EASY Training Model
    • 6 Conclusion and Future Work
  • Chapter 9: Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory
    • Abstract
    • 1 Introduction
    • 2 Background and Related Work
    • 3 Methodology
    • 4 Cyber Threat Landscape From a Rat Perspective
    • 5 Discussion
    • 6 Conclusion and Future Work
    • Appendix 1 Questionnaire Items
  • Chapter 10: Forensic Readiness: A Case Study on Digital CCTV Systems Antiforensics
    • Abstract
    • 1 Introduction
    • 2 Our Proposed Antiforensics Framework for Digital CCTV Systems
    • 3 Case Studies
    • 4 Conclusion
  • Chapter 11: Forensic Visualization: Survey and Future Research Directions
    • Abstract
    • 1 Introduction
    • 2 Digital Forensics
    • 3 Visualization is Key
    • 4 Forensic Visualization Selection Criteria
    • 5 Conclusion and Future Research
  • Chapter 12: Investigating Storage as a Service Cloud Platform: pCloud as a Case Study
    • Abstract
    • 1 Introduction
    • 2 Research Methodology
    • 3 Analysis and Findings
    • 4 Network Traffic
    • 5 Conclusion
  • Chapter 13: Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud
    • Abstract
    • 1 Introduction
    • 2 Research Methodology
    • 3 Findings: SpiderOak
    • 4 Findings: JustCloud
    • 5 Finding: pCloud
    • 6 Conclusion and Future Work
  • Chapter 14: Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies
    • Abstract
    • 1 Introduction
    • 2 Research Methodology
    • 3 Results and Discussion
    • 4 Reporting and Presentation
    • 5 Conclusion
  • Chapter 15: An Android Cloud Storage Apps Forensic Taxonomy
    • Abstract
    • 1 Introduction
    • 2 Experiment Setup
    • 3 Discussion
    • 4 Results
    • 5 Conclusion and Future Works
    • Appendix 1 List of Application Versions
    • Appendix 2 Dataset List (EDRM)
    • Appendix 3 Retrieved Artifacts
    • Appendix 4 Network Traffic
  • Index

Details

No. of pages:
326
Language:
English
Copyright:
© Syngress 2017
Published:
Imprint:
Syngress
eBook ISBN:
9780128054482
Paperback ISBN:
9780128053034

About the Editor

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo is currently a cloud technology endowed associate professor at University of Texas at San Antonio, an associate professor at the University of South Australia, and a guest professor at China University of Geosciences. He has been an invited speaker for a number of events, such as the 2011 UNODC-ITU Asia-Pacific Regional Workshop on Fighting Cybercrime, the Korean (Government) Institute of Criminology (2013), the UNAFEI and UAE Government conference in 2014, and the World Internet Conference (Wuzhen Summit) in 2014, jointly organized by the Cyberspace Administration of China and the People's Government of Zhejiang Province. He has also been a Keynote/Plenary Speaker at conferences such as SERENE-RISC Spring 2016 Workshop, IEEE International Conference on Data Science and Data Intensive Systems (DSDIS 2015) and those organised by Infocomm Development Authority of Singapore, A*Star, Nanyang Technological University and Singapore Management University (2015) , Cloud Security Alliance New Zealand (2015), CSO Australia and Trend Micro (2015) , Anti-Phishing Working Group (2014), National Taiwan University of Science and Technology (2014), Asia Pacific University of Technology & Innovation (Malaysia; 2014), Nanyang Technological University (Singapore; 2011), and National Chiayi University (Taiwan; 2010); and an Invited Expert at UNAFEI Criminal Justice Training in 2015, at INTERPOL Cyber Research Agenda Workshop 2015, and at Taiwan Ministry of Justice Investigation Bureau’s 2015 International Symposium on Regional Security and Transnational Crimes . He was named one of 10 Emerging Leaders in the Innovation category of The Weekend Australian Magazine / Microsoft’s Next 100 series in 2009, and is the recipient of various awards including ESORICS 2015 Best Research Paper Award, Winning Team in Germany's University of Erlangen-Nuremberg (FAU) Digital Forensics Research Challenge 2015, Highly Commended Award from Australia New Zealand Policing Advisory Agency in 2014, Fulbright Scholarship in 2009, British Computer Society’s Wilkes Award in 2008, and 2008 Australia Day Achievement Medallion. He is a Fellow of the Australian Computer Society, and a Senior Member of the IEEE.

Affiliations and Expertise

Department of Information Systems and Cyber Security, University of Texas at San Antonio, USA; School of Information Technology and Mathematical Sciences, University of South Australia, Australia

Ali Dehghantanha

Ali Dehghantanha is serving as a Mari-Curie International Incoming Research Fellow in cyber forensics at University of Salford, Manchester, UK. Ali has served for several years in a variety of industrial and academic positions with leading players in Cyber-Security and Digital Forensics. He has a long history of working in different areas of computer security as a security researcher, malware analyzer, penetration tester, security consultant, and forensic analyst. He regularly travels the globe on speaking, teaching, and consulting engagements and assist clients in securing their information assets. Ali is imminently qualified in the field of cyber-security; he holds Ph.D in Security in Computing and a number of professional qualifications namely GREM, CCFP,CISSP, CISM ISMS L.A, CEH, CHFI, ECSA, and ECIH and he is the founder of annual “International Conference in Cyber-Security, Cyber Warfare and Digital Forensics (CyberSec)”.

Affiliations and Expertise

EU Marie-Curie International Incoming Research Fellow, School of Computing, University of Salford, UK