Cover image for Alternate Data Storage Forensics.
Alternate Data Storage Forensics.
Title:
Alternate Data Storage Forensics.
Author:
Schroader, Amber.
ISBN:
9780080554754
Personal Author:
Physical Description:
1 online resource (337 pages)
Contents:
Front Cover -- Alternate Data Storage Forensics -- Copyright Page -- Contents -- Chapter 1. Digital Forensics and Analyzing Data -- Introduction -- The Evolution of Computer Forensics -- Phases of Digital Forensics -- Summary -- References -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 2. Seizure of Digital Information -- Introduction -- Defining Digital Evidence -- Digital Evidence Seizure Methodology -- Factors Limiting the Wholesale Seizure of Hardware -- Other Options for Seizing Digital Evidence -- Common Threads within Digital Evidence Seizure -- Determining the Most Appropriate Seizure Method -- Summary -- Works Cited -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3. Introduction to Handheld Forensics -- Digital Forensics -- What Is the Handheld Forensic Impact? -- Cellular Handling -- Evidence Preservation -- Maintain a Forensic Data Connection -- Analysis and Reporting -- Chapter 4. PDA, Blackberry, and iPod Forensic Analysis -- Introduction -- PDA Forensics -- PDA Investigative Tips -- Expansion Sleeve Removed -- Deploying PDA Forensic Tools -- Introduction to the Blackberry -- Security for Stored Data -- Forensic Examination of a Blackberry -- Attacking The Blackberry -- Securing the Blackberry (RIM) -- iPod Forensics -- Misuse of an iPod -- iPod Investigation -- The iPod and Windows -- The iPod and Linux -- User Accounts -- Deleted Files -- iPod Time Issues -- Registry Key Containing the iPod's USB/Firewire Serial Number -- iPod Tools -- Summary -- Notes -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5. E-mail Forensics -- Introduction -- Where to Start? -- Forensic Acquisition -- Processing Local Mail Archives -- Using Paraben's Network E-mail Examiner (NEMX) -- Chapter 6. Router Forensics -- Introduction -- Network Forensics -- Searching for Evidence -- An Overview of Routers.

Hacking Routers -- Investigating Routers -- Incident Response -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7. Legal Issues of Intercepting WiFi Transmissions -- Introduction -- WiFi Technology -- Understanding WiFi RF -- Scanning RF -- Eavesdropping on WiFi -- Fourth Amendment Expectation of Privacy in WLANs -- Summary -- Works Cited -- Solutions Fast Track -- Freyuently Asked Questions -- Chapter 8. CD and DVD Forensics -- Physical Characteritics of CD and DVD Media -- CD Features -- CD and DVD Logical Structure -- Space Allocation by CD and DVD File Systems -- Disc Accessibility Problems -- Forensic Binary Images -- Collecting CD and DVD Evidence -- Preparing for Disc Examination -- Chapter 9. MP3 Forensics -- Introduction -- History -- Why Is an iPod Considered Alternative Media? -- Imaging and Hashing -- Hardware vs . Nonhardware Imaging -- Types of iPods -- File Systems -- "Hacking Tools" and Encrypted Home Directories -- Evidence: Normal vs . Not Normal -- Analysis Tools -- Summary -- Index.
Abstract:
Learn to pull "digital fingerprints” from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use. This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more using state of the art tools. Finally, the book takes a look into the future at "not yet every day” devices which will soon be common repositories for hiding and moving data for both legitimate and illegitimate purposes. * Authors are undisputed leaders who train the Secret Service, FBI, and Department of Defense * Book presents "one of a kind" bleeding edge information that absolutely can not be found anywhere else * Today the industry has exploded and cyber investigators can be found in almost every field.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: