
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
Free Global Shipping
No minimum orderDescription
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices. This is the first book that covers the investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized research, led research, and been published widely in the field. Users will gain a deep overview of seminal research in the field while also identifying prospective future research topics and open challenges.
Key Features
- Presents the most current, leading edge research on cloud and mobile application forensics, featuring a panel of top experts in the field
- Introduces the first book to provide an in-depth overview of the issues surrounding digital forensic investigations in cloud and associated mobile apps
- Covers key technical topics and provides readers with a complete understanding of the most current research findings
- Includes discussions on future research directions and challenges
Readership
Mobile security and privacy research communities and practitioner communities. Information Security professionals, digital forensic analysts, researchers, and practitioners, as well as university students in digital forensics programs
Table of Contents
- About the Editors
- Chapter 1: Contemporary Digital Forensics Investigations of Cloud and Mobile Applications
- Abstract
- Chapter 2: Forensics Analysis of Android Mobile VoIP Apps
- Abstract
- 1 Introduction
- 2 Related Work
- 3 Experimental Setup
- 4 Results and Discussion
- 5 Conclusion and Future Work
- Chapter 3: Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine
- Abstract
- 1 Introduction
- 2 Related Work
- 3 Research Methodology
- 4 AIM Forensics
- 5 Conclusion and Future Work
- Chapter 4: Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies
- Abstract
- 1 Introduction
- 2 Methodology
- 3 Experiment Setup
- 4 Discussion and Analysis
- 5 Conclusion
- Chapter 5: Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies
- Abstract
- 1 Introduction
- 2 Experiment Setup
- 3 Discussion and Analysis
- 4 Conclusion and Future Works
- Chapter 6: Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors
- Abstract
- 1 Introduction
- 2 Review of Related Work
- 3 Experiment Design
- 4 Results and Discussion
- 5 Forensics Investigation Guideline
- 6 Limitations
- 7 Conclusion and Further Research
- Chapter 7: Performance of Android Forensics Data Recovery Tools
- Abstract
- 1 Introduction
- 2 Related Work
- 3 Experiment Setup
- 4 Results and Discussions
- 5 Conclusion and Future Works
- Chapter 8: Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model
- Abstract
- Acknowledgments
- 1 Introduction
- 2 Experiment Setup
- 3 Findings: Dionaea
- 4 Findings: Kippo
- 5 A Conceptual EASY Training Model
- 6 Conclusion and Future Work
- Chapter 9: Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory
- Abstract
- 1 Introduction
- 2 Background and Related Work
- 3 Methodology
- 4 Cyber Threat Landscape From a Rat Perspective
- 5 Discussion
- 6 Conclusion and Future Work
- Appendix 1 Questionnaire Items
- Chapter 10: Forensic Readiness: A Case Study on Digital CCTV Systems Antiforensics
- Abstract
- 1 Introduction
- 2 Our Proposed Antiforensics Framework for Digital CCTV Systems
- 3 Case Studies
- 4 Conclusion
- Chapter 11: Forensic Visualization: Survey and Future Research Directions
- Abstract
- 1 Introduction
- 2 Digital Forensics
- 3 Visualization is Key
- 4 Forensic Visualization Selection Criteria
- 5 Conclusion and Future Research
- Chapter 12: Investigating Storage as a Service Cloud Platform: pCloud as a Case Study
- Abstract
- 1 Introduction
- 2 Research Methodology
- 3 Analysis and Findings
- 4 Network Traffic
- 5 Conclusion
- Chapter 13: Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud
- Abstract
- 1 Introduction
- 2 Research Methodology
- 3 Findings: SpiderOak
- 4 Findings: JustCloud
- 5 Finding: pCloud
- 6 Conclusion and Future Work
- Chapter 14: Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies
- Abstract
- 1 Introduction
- 2 Research Methodology
- 3 Results and Discussion
- 4 Reporting and Presentation
- 5 Conclusion
- Chapter 15: An Android Cloud Storage Apps Forensic Taxonomy
- Abstract
- 1 Introduction
- 2 Experiment Setup
- 3 Discussion
- 4 Results
- 5 Conclusion and Future Works
- Appendix 1 List of Application Versions
- Appendix 2 Dataset List (EDRM)
- Appendix 3 Retrieved Artifacts
- Appendix 4 Network Traffic
- Index
Product details
- No. of pages: 326
- Language: English
- Copyright: © Syngress 2016
- Published: October 12, 2016
- Imprint: Syngress
- Paperback ISBN: 9780128053034
- eBook ISBN: 9780128054482
About the Editors
Kim-Kwang Raymond Choo
Kim-Kwang Raymond Choo is currently a cloud technology endowed associate professor at University of Texas at San Antonio, an associate professor at the University of South Australia, and a guest professor at China University of Geosciences. He has been an invited speaker for a number of events, such as the 2011 UNODC-ITU Asia-Pacific Regional Workshop on Fighting Cybercrime, the Korean (Government) Institute of Criminology (2013), the UNAFEI and UAE Government conference in 2014, and the World Internet Conference (Wuzhen Summit) in 2014, jointly organized by the Cyberspace Administration of China and the People's Government of Zhejiang Province. He has also been a Keynote/Plenary Speaker at conferences such as SERENE-RISC Spring 2016 Workshop, IEEE International Conference on Data Science and Data Intensive Systems (DSDIS 2015) and those organised by Infocomm Development Authority of Singapore, A*Star, Nanyang Technological University and Singapore Management University (2015) , Cloud Security Alliance New Zealand (2015), CSO Australia and Trend Micro (2015) , Anti-Phishing Working Group (2014), National Taiwan University of Science and Technology (2014), Asia Pacific University of Technology & Innovation (Malaysia; 2014), Nanyang Technological University (Singapore; 2011), and National Chiayi University (Taiwan; 2010); and an Invited Expert at UNAFEI Criminal Justice Training in 2015, at INTERPOL Cyber Research Agenda Workshop 2015, and at Taiwan Ministry of Justice Investigation Bureau’s 2015 International Symposium on Regional Security and Transnational Crimes . He was named one of 10 Emerging Leaders in the Innovation category of The Weekend Australian Magazine / Microsoft’s Next 100 series in 2009, and is the recipient of various awards including ESORICS 2015 Best Research Paper Award, Winning Team in Germany's University of Erlangen-Nuremberg (FAU) Digital Forensics Research Challenge 2015, Highly Commended Award from Australia New Zealand Policing Advisory Agency in 2014, Fulbright Scholarship in 2009, British Computer Society’s Wilkes Award in 2008, and 2008 Australia Day Achievement Medallion. He is a Fellow of the Australian Computer Society, and a Senior Member of the IEEE.
Affiliations and Expertise
Department of Information Systems and Cyber Security, University of Texas at San Antonio, USA; School of Information Technology and Mathematical Sciences, University of South Australia, Australia
Ali Dehghantanha
Ali Dehghantanha is serving as a Mari-Curie International Incoming Research Fellow in cyber forensics at University of Salford, Manchester, UK. Ali has served for several years in a variety of industrial and academic positions with leading players in Cyber-Security and Digital Forensics. He has a long history of working in different areas of computer security as a security researcher, malware analyzer, penetration tester, security consultant, and forensic analyst. He regularly travels the globe on speaking, teaching, and consulting engagements and assist clients in securing their information assets. Ali is imminently qualified in the field of cyber-security; he holds Ph.D in Security in Computing and a number of professional qualifications namely GREM, CCFP,CISSP, CISM ISMS L.A, CEH, CHFI, ECSA, and ECIH and he is the founder of annual “International Conference in Cyber-Security, Cyber Warfare and Digital Forensics (CyberSec)”.
Affiliations and Expertise
EU Marie-Curie International Incoming Research Fellow, School of Computing, University of Salford, UK
Ratings and Reviews
There are currently no reviews for "Contemporary Digital Forensic Investigations of Cloud and Mobile Applications"