ABSTRACT

Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic techn

chapter |2 pages

Section 1: The Nature of Cyber Crime

chapter 2|16 pages

The Potential Impacts of Cyber Crime

chapter 3|14 pages

Rogue Code Attacks

chapter 4|16 pages

Surgical Strikes and Shotgun Blasts

chapter |2 pages

Section 2: Investigating Cyber Crime

chapter 6|14 pages

Look for the Hidden Flaw

chapter 8|28 pages

Launching the Investigation

chapter 9|22 pages

Determining If a Crime Has Taken Place

chapter 10|16 pages

Handling the Crime in Progress

chapter 12|10 pages

Involving the Authorities

chapter 13|8 pages

When an Investigation Can’t Continue

chapter |2 pages

Section 3: Preparing for Cyber Crime

chapter 14|18 pages

Building a Corporate Cyber “SWAT Team”

chapter 15|8 pages

Privacy and Computer Crime

chapter |2 pages

Section 4: Using the Forensic Utilities

chapter 16|6 pages

Preserving Evidence — Basic Concepts

chapter 17|6 pages

Collecting Evidence — First Steps

chapter 18|8 pages

Searching for Hidden Information

chapter 19|2 pages

Handling Floppy Disks