Home Page Icon
Home Page
Table of Contents for
Title Page
Close
Title Page
by Mike Sheward
Hands-on Incident Response and Digital Forensics
Front Cover
Half-Title Page
BCS, THE CHARTERED INSTITUTE FOR IT
Title Page
Copyright Page
Contents
List of figures
Author
Foreword
Acknowledgements
Glossary
Useful websites
Preface
Introduction
Incident response
Digital forensics
Why both?
Hands-on
How this book fits in
Part 1 Incident Response
1. Understanding Information Security Incidents
What is an information security incident?
Types of incident
Detecting security incidents
Why do security incidents happen?
Summary
2. Before the Incident
Building the incident response playbook
Testing the playbook
Incident planning and compliance
Forensic readiness
Summary
3. The Incident Response Process
Identification
Containment
Eradication
Recovery
Summary
4. Things to Avoid During Incident Response
Eradication and preservation
An incident from an incident
The blame game
It’s not over until it’s over
Summary
5. After the Incident
Post mortem
Quantify the impact
Forensics
Summary
6. The Business of Incident Response
Request for proposal
The power of PR
Mergers and acquisitions
Escape the technical bubble
Incident response service providers
Summary
Part 2 Digital Forensics
7. Introducing the Digital Forensics Investigation
The investigator
Forensics fundamentals
Arriving at an investigation
Investigative process
Summary
8. The Laws and Ethics of Digital Forensics
Crimes without borders
Laws applicable to forensics
Ethical considerations
Summary
9. Digital Forensics Tools
Grab bag
Forensic hardware
Forensic software
Summary
10. Evidence Acquisition Basics
The hard disk drive
Removable media
Processing disk images
File systems
Operating systems
Files
Analysis of artefacts
Summary
11. Capturing a Moving Target
Incident response and digital forensics
Live acquisition drivers
Live acquisition technique
Order of volatility
Network forensics
Summary
12. Memory Forensics
Understanding memory devices
Capturing
Analysis
Summary
13. Cloud Forensics
Cloud computing terminology
Acquisition in the cloud
Container forensics
Forensics in the cloud?
Summary
14. Mobile Device Forensics
Mobile phone terminology
Seizing mobile devices
Acquisition types and tools
Smartphones
Summary
15. Reporting and Presenting Your Findings
Layout and content
Audience
Summary
16. The Human Elements of an Investigation
Victims
Perpetrators
Investigators
Summary
Index
Back Cover
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
BCS, THE CHARTERED INSTITUTE FOR IT
Next
Next Chapter
Copyright Page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset