Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by John Sammons
Digital Forensics
Cover
Title page
Table of Contents
Copyright
Dedication
List of Contributors
Editor Biography
Biographies
Acknowledgments
Chapter 1: The cryptocurrency enigma
Abstract
Purpose
Introduction
What makes a currency?
Cryptocurrency
Public key encryption basics
Forensic relevance
Bitcoin
Bitcoin protocol
Forensic artifacts
Multibit HD
The bitcoin protocol in action
Summary
Chapter 2: The key to forensic success: examination planning is a key determinant of efficient and effective digital forensics
Abstract
Introduction
The four phases of digital forensics
It is a matter of questions
Investigative questions
Legal questions
Forensic questions
Identification
Classification/individualization
Association
Reconstruction
Forensic questions as a bridge
Developing forensic hypotheses
Knowing how far to go
Starting the plan
How do you know when you are done?
Examination phase – data extraction
The forensic analysis
The examination planning process
Conclusion
Chapter 3: Psychological profiling as an investigative tool for digital forensics
Abstract
Current model
Issues
New model
Phases
Limitations
Case studies
Conclusions
Chapter 4: The intersection between social media, crime, and digital forensics: #WhoDunIt?
Abstract
Introduction
Social media and crime
Social media and digital forensics
Social media evidence on the network
Social media evidence on the physical device
Summary
Chapter 5: Mobile device forensics: threats, challenges, and future trends
Abstract
Introduction
The hardware versus software complexity trend
Cloud services and mobile platforms – inherent vulnerabilities
There is an app for that – forensic challenges and threats within apps
Persistent threats and challenges – what lies ahead for mobile device forensics
Conclusion
Chapter 6: Digital forensics in an eDiscovery world
Abstract
Introduction
eDiscovery processes and EDRM
Digital investigations workflows
Chapter 7: OS X El Capitan forensics
Abstract
Introduction
Default directory structure
User
{User name}/library
New features in OS X 10.11 El Capitan
Conclusion
Quick reference table
Chapter 8: Cybercrimes: an overview of contemporary challenges and impending threats
Abstract
Combating cybercrimes
Current cybercrimes and evolving threats
Hacking
Future issues for law enforcement and digital forensic analysts
Chapter 9: Legal
Abstract
Introduction
The fourth amendment
Search warrants
Federal privacy legislation
Drones
Tracking vehicles
Tracking cell phones
Automated license plate readers
Cell phones
Encryption
Encryption and cell phones
The internet of things
The dark web
Malware
Looking ahead
Author Index
Subject Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Title page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset