1 option
Cybercrime investigators handbook / Graeme Edwards, PhD.
- Format:
- Book
- Author/Creator:
- Edwards, Graeme (Financial and cybercrime investigator), author.
- Language:
- English
- Subjects (All):
- Computer crimes--Investigation.
- Computer crimes.
- Physical Description:
- 1 online resource
- Place of Publication:
- Hoboken, New Jersey : John Wiley & Sons, Inc., [2020]
- System Details:
- text file
- Contents:
- Cover; Title Page; Copyright; Contents; List of Figures; About the Author; Foreword; Acknowledgments; Chapter 1 Introduction; Chapter 2 Cybercrime Offenses; Potential Cybercrime Offenses; Industrial Espionage; Theft of Information Such as Identities, Staff Files, and Accounts; Computer Hacking to Gain Access to System Resources; Gaining or Exceeding Authorized Access Levels to Obtain Highly Restricted Data; Exploiting Information Security Weaknesses through the Supply Chain, Including Third-Party Contractors; Stealing Credit Card Data for Selling Online, or Card-Not-Present Fraud
- Gaining Access to a System or Device through Malicious SoftwareDamaging the Reputation of a Competitor to Gain a Market Advantage; Changes to Computer Systems or Devices; Vandalism to Prove the Skills of the Attacker; Drive-by Downloads of Malicious Software; Interfering with Access to a Network; Ransomware; Phishing Attacks and Money Laundering; Business Email Compromise Fraud; Social Engineering Fraud; Cybercrime Case Study; Notes; Chapter 3 Motivations of the Attacker; Common Motivators; Revenge; Opportunity; Greed; Test of Skill; Business Competitor; Professional Criminal
- Issue-Motivated AttackerGeopolitics; Terrorism; Cybercrime Case Study I; Cybercrime Case Study II; Note; Chapter 4 Determining That a Cybercrime Is Being Committed; Cyber Incident Alerts; Attack Methodologies; Cybercrime Case Study I; Cybercrime Case Study II; Notes; Chapter 5 Commencing a Cybercrime Investigation; Why Investigate a Cybercrime?; The Cyber Investigator; Management Support; Is There a Responsibility to Try to Get the Data Back?; Cybercrime Case Study; Notes; Chapter 6 Legal Considerations When Planning an Investigation; Role of the Law in a Digital Crimes Investigation
- Protecting Digital EvidencePreservation of the Chain of Custody; Protection of Evidence; Legal Implications of Digital Evidence Collection; Cybercrime Case Study; Note; Chapter 7 Initial Meeting with the Complainant; Initial Discussion; Complainant Details; Event Details; Cyber Security History; Scene Details; Identifying Offenses; Identifying Witnesses; Identifying Suspects; Identifying the Modus Operandi of Attack; Evidence: Technical; Evidence: Other; Cybercrime Case Study; Chapter 8 Containing and Remediating the Cyber Security Incident; Containing the Cyber Security Incident
- Eradicating the Cyber Security IncidentNote; Chapter 9 Challenges in Cyber Security Incident Investigations; Unique Challenges; Defining Investigation Boundaries and Management Objectives; Identifying Potential Offenses (Criminal and/or Civil); Identifying Compromised Data and/or Resources; Identifying Suspects and Motivations; Identifying Exploited Vulnerabilities; Securing Evidence; Understanding the Legal Jurisdiction Where the Incident Occurred and the Evidence Exists; Locating Digital Evidence in a Timely Manner; Maintaining the Chain of Evidence across Multiple Jurisdictions
- Notes:
- Includes index.
- Electronic reproduction. Hoboken, N.J. Available via World Wide Web.
- Description based on print version record and CIP data provided by publisher.
- Local Notes:
- Acquired for the Penn Libraries with assistance from the Lipman Criminology Library Fund.
- Other Format:
- Print version: Edwards, Graeme (Financial and cybercrime investigator). Cybercrime investigators handbook
- ISBN:
- 9781119596301
- 1119596300
- 9781119596325
- 1119596327
- 9781119596318
- 1119596319
- Publisher Number:
- 99987069198
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.