Home Page Icon
Home Page
Table of Contents for
Author Index
Close
Author Index
by John Sammons
Digital Forensics
Cover
Title page
Table of Contents
Copyright
Dedication
List of Contributors
Editor Biography
Biographies
Acknowledgments
Chapter 1: The cryptocurrency enigma
Abstract
Purpose
Introduction
What makes a currency?
Cryptocurrency
Public key encryption basics
Forensic relevance
Bitcoin
Bitcoin protocol
Forensic artifacts
Multibit HD
The bitcoin protocol in action
Summary
Chapter 2: The key to forensic success: examination planning is a key determinant of efficient and effective digital forensics
Abstract
Introduction
The four phases of digital forensics
It is a matter of questions
Investigative questions
Legal questions
Forensic questions
Identification
Classification/individualization
Association
Reconstruction
Forensic questions as a bridge
Developing forensic hypotheses
Knowing how far to go
Starting the plan
How do you know when you are done?
Examination phase – data extraction
The forensic analysis
The examination planning process
Conclusion
Chapter 3: Psychological profiling as an investigative tool for digital forensics
Abstract
Current model
Issues
New model
Phases
Limitations
Case studies
Conclusions
Chapter 4: The intersection between social media, crime, and digital forensics: #WhoDunIt?
Abstract
Introduction
Social media and crime
Social media and digital forensics
Social media evidence on the network
Social media evidence on the physical device
Summary
Chapter 5: Mobile device forensics: threats, challenges, and future trends
Abstract
Introduction
The hardware versus software complexity trend
Cloud services and mobile platforms – inherent vulnerabilities
There is an app for that – forensic challenges and threats within apps
Persistent threats and challenges – what lies ahead for mobile device forensics
Conclusion
Chapter 6: Digital forensics in an eDiscovery world
Abstract
Introduction
eDiscovery processes and EDRM
Digital investigations workflows
Chapter 7: OS X El Capitan forensics
Abstract
Introduction
Default directory structure
User
{User name}/library
New features in OS X 10.11 El Capitan
Conclusion
Quick reference table
Chapter 8: Cybercrimes: an overview of contemporary challenges and impending threats
Abstract
Combating cybercrimes
Current cybercrimes and evolving threats
Hacking
Future issues for law enforcement and digital forensic analysts
Chapter 9: Legal
Abstract
Introduction
The fourth amendment
Search warrants
Federal privacy legislation
Drones
Tracking vehicles
Tracking cell phones
Automated license plate readers
Cell phones
Encryption
Encryption and cell phones
The internet of things
The dark web
Malware
Looking ahead
Author Index
Subject Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Chapter 9: Legal
Next
Next Chapter
Subject Index
Author Index
A
Ahu, T. M.,
147
Alhogbani, A.,
147
Allison, S. F. H.,
126
Anderson, J. M.,
148
Attoe, Rob,
85–98
Atwood, J. R.,
148
B
Babchisin, K. M.,
129
Ball, C.,
64
Bay, J.,
49
Bobbitt, R.,
78
Bora, Dhruba J.,
119–130
Bossler, A.,
60
Boyd, D.,
59
Brenner, S.,
129
Brown, C.,
64
Brunty, J.,
59
,
61
,
69–82
Brunty, J. L.,
123
C
Carsten, P., 73
Casey, E.,
61
,
64
Catalano, S.,
127
Cavezza, C.,
127
Clancy, T. K.,
64
Clifford, R. D.,
60
,
120
Cohen-Almagor, R.,
128
,
129
Coleman, G.,
122
Collins, K.,
123
Copes, H.,
124
,
126
Covey, S. R.,
37
Cusack, B.,
64
,
65
D
Dalal, A. S.,
122
,
123
Damshenas, M.,
47
Dehghantanha, A.,
47
del Carmen, R. V.,
148
Dempsey, G.,
119
DeTardo-Bora, Kimberly A.,
119–130
Douglas, J. E.,
45
,
46
,
49
D’Ovidio, R.,
127
Doyle, J.,
127
Duggan, M.,
59
,
60
E
Ellison, N.,
59
Ellison, N. B.,
59
,
60
Engler, R.,
79
,
80
F
Finkle, J.,
72
Flores, B. M.,
60
Franzen, C.,
74
G
Galizio, G. J.,
148
Gardner, B.,
123
Garfinkel, S. L.,
47
Gierlack, K.,
148
Gold, S.,
123
Grabosky, P.,
119
Graves, M.,
50
Griffin, D. J.,
60
Gross, D.,
61
Guarino, A.,
47
H
Haenlein, M.,
59
Halbert, D.,
121
Hansen, M.,
148
Hanson, R. K.,
129
Hare, R. C.,
123
Hein, B.,
71
Helenek, K.,
59
,
61
,
123
Hermann, C. A.,
129
Hitchens, M.,
64
Hollinger, R.,
123
Holt, T.,
60
Holt, T. J.,
123
I
Inman, K.,
32
Irons, A.,
48
Israel, J. H.,
149
J
Jordan, Shawn,
99–116
K
Kaplan, A. M.,
59
Karanasiou, A. P.,
123
Kerr, O. S.,
148
King, N. J.,
149
Koerner, M. R.,
149
L
LaFave, W. R.,
149
Lallie, H.,
48
Lampe, C.,
59
,
60
Larkin, J. E. D.,
149
LaTourrette, T.,
148
Lenhart, A.,
59
,
60
,
128
Lersch, K. M.,
126
Leshney, Sean C.,
59–66
Li, V.,
149
Locker, M.,
61
Lunden, I.,
74
M
Mack, E.,
119
Madden, M.,
59
,
60
Mahmoud, R.,
47
Maras, M.,
61
Martin, J.,
149
Mayer, L. A.,
148
McCarthy, J. A.,
121
,
128
,
129
McEwan, T. E.,
127
McNally, M.,
126
McNeal, G.,
149
McQuaid, J.,
65
Meyers, M.,
47
Miller, Preston,
1–24
Morrison, C. M.,
149
Murray, N.,
65
N
Neil, M.,
149
Nelson, B.,
62
,
66
O
Olivito, J.,
149
P
Peppet, S. R.,
149
Phelps, D. C.,
123
Phillips, A.,
62
,
66
Pollitt, Mark,
27–42
Purcell, K.,
128
R
Raleigh, L.,
60
Roberts, H.,
61
Rogers, M.,
45
,
49
Rogers, M. K.,
45–47
,
49
,
50
,
57
,
122
Roose, K.,
60
Roussev, V.,
47
Rudin, N.,
32
S
Saferstein, R.,
46
Salama, U.,
64
Sanchez, R.,
78
Schuck, A. M.,
126
Seigfried-Spellar, K. C.,
49
,
50
,
59–60
,
66
Sharma, R.,
122
,
123
Siciliano, R.,
79
Simon, R.,
149
Smallbone, S.,
128–130
Smith, A.,
128
Smith, R. G.,
119
Son, J.,
64
,
65
Steuart, C.,
62
,
66
T
Thompson, R. M., II,
149
Toppo, G.,
76
Tsotsis, A.,
74
Turvey, B.,
45
Turvey, B. E.,
122
V
Van Brocklin, V.,
150
Vance, Jr., C. R.,
150
Varadharajan, V.,
64
Vieraitis, L. M.,
124
,
126
W
Wall, D. S.,
119
,
120
Weber, R. H.,
150
Weiser, B.,
150
Williams, S.,
148
Workman, M.,
123
Wortley, R.,
128–130
Z
Zatyko, K.,
49
Zetter, K.,
61
Zickuhr, K.,
128
Zmud, J.,
148
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset