Table of Contents

Cover image

Title page

Copyright

Contributors

About the Editors

Chapter 1: Contemporary Digital Forensics Investigations of Cloud and Mobile Applications

Abstract

Chapter 2: Forensics Analysis of Android Mobile VoIP Apps

Abstract

1 Introduction

2 Related Work

3 Experimental Setup

4 Results and Discussion

5 Conclusion and Future Work

Chapter 3: Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine

Abstract

1 Introduction

2 Related Work

3 Research Methodology

4 AIM Forensics

5 Conclusion and Future Work

Chapter 4: Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies

Abstract

1 Introduction

2 Methodology

3 Experiment Setup

4 Discussion and Analysis

5 Conclusion

Chapter 5: Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies

Abstract

1 Introduction

2 Experiment Setup

3 Discussion and Analysis

4 Conclusion and Future Works

Chapter 6: Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors

Abstract

1 Introduction

2 Review of Related Work

3 Experiment Design

4 Results and Discussion

5 Forensics Investigation Guideline

6 Limitations

7 Conclusion and Further Research

Chapter 7: Performance of Android Forensics Data Recovery Tools

Abstract

1 Introduction

2 Related Work

3 Experiment Setup

4 Results and Discussions

5 Conclusion and Future Works

Chapter 8: Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model

Abstract

Acknowledgments

1 Introduction

2 Experiment Setup

3 Findings: Dionaea

4 Findings: Kippo

5 A Conceptual EASY Training Model

6 Conclusion and Future Work

Chapter 9: Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory

Abstract

1 Introduction

2 Background and Related Work

3 Methodology

4 Cyber Threat Landscape From a Rat Perspective

5 Discussion

6 Conclusion and Future Work

Appendix 1 Questionnaire Items

Chapter 10: Forensic Readiness: A Case Study on Digital CCTV Systems Antiforensics

Abstract

1 Introduction

2 Our Proposed Antiforensics Framework for Digital CCTV Systems

3 Case Studies

4 Conclusion

Chapter 11: Forensic Visualization: Survey and Future Research Directions

Abstract

1 Introduction

2 Digital Forensics

3 Visualization is Key

4 Forensic Visualization Selection Criteria

5 Conclusion and Future Research

Chapter 12: Investigating Storage as a Service Cloud Platform: pCloud as a Case Study

Abstract

1 Introduction

2 Research Methodology

3 Analysis and Findings

4 Network Traffic

5 Conclusion

Chapter 13: Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud

Abstract

1 Introduction

2 Research Methodology

3 Findings: SpiderOak

4 Findings: JustCloud

5 Finding: pCloud

6 Conclusion and Future Work

Chapter 14: Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies

Abstract

1 Introduction

2 Research Methodology

3 Results and Discussion

4 Reporting and Presentation

5 Conclusion

Chapter 15: An Android Cloud Storage Apps Forensic Taxonomy

Abstract

1 Introduction

2 Experiment Setup

3 Discussion

4 Results

5 Conclusion and Future Works

Appendix 1 List of Application Versions

Appendix 2 Dataset List (EDRM)

Appendix 3 Retrieved Artifacts

Appendix 4 Network Traffic

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.123.252