
The Basics of Digital Forensics
The Primer for Getting Started in Digital Forensics
Description
Key Features
- Learn what Digital Forensics entails
- Build a toolkit and prepare an investigative plan
- Understand the common artifacts to look for in an exam
- Second Edition features all-new coverage of hard drives, triage, network intrusion response, and electronic discovery; as well as updated case studies and expert interviews
Readership
Table of Contents
- Dedication
- Preface
- Acknowledgments
- Chapter 1: Introduction
- Abstract
- Introduction
- What is forensic science?
- What is digital forensics?
- Uses of digital forensics
- The digital forensics process
- Locard’s exchange principle
- Scientific method
- Organizations of note
- Role of the forensic examiner in the judicial system
- Summary
- Chapter 2: Key technical concepts
- Abstract
- Introduction
- Bits, bytes, and numbering schemes
- File extensions and file signatures
- Storage and memory
- Computing environments
- Data types
- File systems
- Allocated and unallocated space
- How magnetic hard drives store data
- Summary
- Chapter 3: Labs and tools
- Abstract
- Introduction
- Forensic laboratories
- Policies and procedures
- Quality assurance
- Digital forensic tools
- Additional resources
- Alert!
- Accreditation
- Summary
- Chapter 4: Collecting evidence
- Abstract
- Introduction
- Crime scenes and collecting evidence
- Alert!
- Alert!
- Documenting the scene
- Chain of custody
- Cloning
- Alert!
- Live system versus dead system
- More advanced
- Alert!
- Hashing
- Final report
- Summary
- Chapter 5: Windows system artifacts
- Abstract
- Introduction
- Deleted data
- More advanced
- Hibernation file (hiberfile.sys)
- Registry
- Print spooling
- Recycle bin
- Alert!
- More advanced
- Metadata
- Alert!
- Thumbnail cache
- Most recently used
- Restore points and shadow copy
- Prefetch
- Link files
- Summary
- Chapter 6: Anti-forensics
- Abstract
- Introduction
- Hiding data
- Password attacks
- Additional resources
- Steganography
- Data destruction
- More advanced
- Summary
- Chapter 7: Legal
- Abstract
- Introduction
- The fourth amendment
- Criminal law—searches without a warrant
- More advanced
- Alert!
- Searching with a warrant
- Electronic discovery
- Alert!
- Expert testimony
- Additional resources
- Summary
- Chapter 8: Internet and e-mail
- Abstract
- Introduction
- Internet overview
- Additional resources
- More advanced
- Web browsers—Internet Explorer
- More advanced
- Alert!
- Social networking sites
- Additional resources
- Summary
- Chapter 9: Network forensics
- Abstract
- Introduction
- Network fundamentals
- Network security tools
- Network attacks
- Alert!
- Incident response
- Network evidence and investigations
- Additional resources
- Summary
- Chapter 10: Mobile device forensics
- Abstract
- Introduction
- Cellular networks
- Operating systems
- Cell phone evidence
- Cell phone forensic tools
- Global positioning systems
- Summary
- Chapter 11: Looking ahead: challenges and concerns
- Abstract
- Introduction
- Standards and controls
- Cloud forensics
- Additional resources
- Alert!
- Solid state drives
- More advanced
- Speed of change
- Additional resources
- Summary
- Index
Product details
- No. of pages: 200
- Language: English
- Copyright: © Syngress 2014
- Published: December 9, 2014
- Imprint: Syngress
- Paperback ISBN: 9780128016350
- eBook ISBN: 9780128018927
About the Author
John Sammons
John is the founder and President of the Appalachian Institute of Digital Evidence. AIDE is a non-profit organization that provides research and training for digital evidence professionals including attorneys, judges, law enforcement and information security practitioners in the private sector. He is the author of best-selling book, The Basics of Digital Forensics published by Syngress.
Affiliations and Expertise
Ratings and Reviews
Latest reviews
(Total rating for all reviews)
Bjarne S. Mon Mar 12 2018
Covered the basics as I
Covered the basics as I was expecting. Easy understandable