Cyber Crime field handbook


Basically maps out the flow, methods and procedures (and associated reasoning) for a routine investigation conducted by a third party Investigator hired, or IT security personnel.
No doubt, when written, certain information was left out, not to mention a copywrite of 2001 indicates many broad advancements in both hard/software are not covered, but much of the information within remains valid.Long gone are the days when a computer took up an entire room.
Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to focus and target something, more than likely they will obtain what they want. We shouldn't expect it to be any different in cyberspace.Cyber Crime Field Handbook provides the details of investigating computer crime from soup to nuts. It covers everything from what to do upon arrival at the scene until the investigation is complete, including chain of evidence.
Contains sample questions to ask the client during the initial contactCovers the steps to follow when the investigator arrives at the client's siteDetails how to use various evidence collection and analysis toolsIllustrates computer forensic tools in action with a case studyProvides computer forensic software tools commands, attack signatures, Cisco PIX firewall command, and more
Cyber Crime Field Handbook provides the investigative framework, a knowledge of how cyberspace really works, and the tools to investigate cyber crime…tools that tell you the who, where, what, when, why, and how.