Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 417 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
417
Dung lượng
2,76 MB
Nội dung
[...]... 1: Computer Crime, Computer Forensics, and Computer Security w Chapter 2: Current Practice w Chapter 3: ComputerForensics in Law Enforcement and National Security w Chapter 4: ComputerForensics in Forensic Accounting The second focus (Chapter 5 to 7) of this book is on intrusion investigation andintrusion forensics, on the inter-relationship between intrusion detection andintrusion forensics, and. .. that intrusions are a special kind of computer crime, and that intrusionforensics is correspondingly a specialization of computerforensics 1.4 Establishing a case in computerforensics Section 1.3 distinguished between crime assisted by computers and crime specifically targeting computers in order to establish the difference between computerforensicsandintrusionforensics Both, however, rely upon computer- based... Here, we explore the special characteristics of computer- based evidence, and its place within the forensic tradition We can then introduce adequate definitions for both computerforensicsandintrusionforensics 1.4 Establishing a case in computerforensics 13 Computerforensicsandintrusion forensics, in both the broad sense (using any computer evidence) and narrow sense (focusing on courtadmissible... incidentally or 4 Computer Crime, Computer Forensics, and Computer Security whether perpetrated through or against a computer We outline a spectrum of ways in which people perpetrate familiar crimes or invent new ones This chapter then highlights that while computerforensicsandintrusionforensics are rapidly gaining ground as valid subdisciplines of traditional forensics, there are both similarities and important... jurisdiction(s), the task of the computer and intrusion forensics investigator will become more critical in the future and is bound to become more complex Having standard references and resources for these personnel is an important step in the maturation of the field This book presents a careful and comprehensive treatment of the areas of computerforensicsandintrusion forensics, thus Foreword by Eugene... increase, there has been a greater need to understand the causes and effects of intrusions, on-line crimes, and network-based attacks The critical importance of the areas of computer forensics, network forensicsandintrusionforensics is growing, and will be of great importance in the years to come Recent events and recent legislation, both national and international, mean that this book is especially... otherwise involving computers 2 Intrusion forensics, which relates to the investigation of attacks or suspicious behavior directed against computers per se In both cases, information technology facilitates both the commission and the investigation of the act in question, and in that sense we see that intrusionforensics is a specific area of computer forensics, applied to computerintrusion activities... computer piracy 12 Computer Crime, Computer Forensics, and Computer Security For example, in the case of an extortion investigation, an investigator would begin by looking at the following: ‘‘ date and time stamps, e-mail, history log, Internet activity logs, temporary Internet files, and user names’’ [7] In contrast, a computerintrusion case suggests both more computer expertise and more computer- based... role computer evidence plays in information warfare (see Chapter 6) and other applications of preventative surveillance In Section 1.4.1 we overview the genesis of computerforensicsand its emergence as a professional discipline, a topic treated in detail in Chapter 3 14 Computer Crime, Computer Forensics, and Computer Security 1.4.1 Computer forensic analysis within the forensic tradition Although computer. .. take place on private networks and via specialpurpose protocols An important point to note is that while computerforensics often speaks in legal terms like evidence, seizure, and investigation, not all computer- related misdeeds are criminal, and not all investigations result in court proceedings We will introduce broad definitions for computerforensicsandintrusionforensics which include these less . between intrusion
detection and intrusion forensics, and upon future developments:
w
Chapter 5: Case Studies
w
Chapter 6: Intrusion Detection and Intrusion Forensics
w
Chapter. . . . . . . . . . . . . 253
6 Intrusion Detection and Intrusion Forensics 257
6.1 Intrusion detection, computer forensics, and
information warfare . . .