0

My Bag

0.00

Download App

Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility 24.0%OFF

Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility

by Andy Jones, Craig Valli and Gerald Kovacich

  • ISBN

    :  

    9781856175104

  • Publisher

    :  

    Butterworth-heinemann

  • Subject

    :  

    Law, Computer Science

  • Binding

    :  

    Paperback

  • Pages

    :  

    285

  • Year

    :  

    2008

18041.0

24.0% OFF

13711.0

Buy Now

Shipping charges are applicable for books below Rs. 101.0

View Details

(Imported Edition) Estimated Shipping Time : 20-23 Business Days

View Details

Share it on

  • Description

    The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the investigations themselves. This includes a great need for information on how to cost-effectively establish and manage a computer forensics laboratory. This book meets that need: a clearly written, non-technical book on the topic of computer forensics with emphasis on the establishment and management of a computer forensics laboratory and its subsequent support to successfully conducting computer-related crime investigations. Contents of the book : SECTION I: Computer Related Crime Investigations and Computer Forensics Management Support. This section provides a background to computer crime and addresses the Computer Forensics management issues related to Computer Forensic Incidents and Crime Investigations. It looks at how investigations are carried out, what needs to be considered in the planning of an investigation and the conduct of the investigation including the collection and storage of evidence. The section finishes with a number of case studies to highlight how things can go well if they are done properly and how they can go wrong if they are not. Chapter 1. A Short History of Computer-Related Crimes and the Developing Need for Computer Forensics. This chapter will provide an overview of computer-related crimes from the less sophisticated and localized dial-up computer crimes to today's sophisticated, global, network attacks; as well as the history of the development of the computer forensics profession and increasingly formal computer forensics laboratories. Chapter 2. An Introduction to Computer Forensics. This chapter provides an overview of the important concepts associated with ";computer forensics."; It describes the potential sources of evidence available in the typical microcomputer, how to conduct a search for evidence, and a method of conducting a search in a systematic and effective manner. Chapter 3. Types of Forensic Investigation. This chapter will include the reasons for carrying out the investigation and the type of investigation that is being undertaken, for example single computer, network or mobile devices. Chapter 4. Responding to Crimes requiring Computer Forensic Investigation. This chapter will talk about what actions are required, the management considerations and just as importantly, what should not be done when responding to a high tech crime scene. It will deal with the differing requirements that must be considered for the range of types of investigation that the laboratory may be called on to take part in including; stand alone PCs, Servers, Networks, Live Acquisition and wireless and will discuss the management issues that relate to the use of function specific tools. Chapter 5. Management of the Collections of Evidence. As the title states, this chapter will talk about the management issues that relate to the collection of high technology crime scene evidence, a crucial part of any high technology investigation. It will also deal with issues such as continuity of evidence in of custody. Chapter 6. Management of evidence storage. This chapter will address the issues that relate to the storage of evidence and the management issues that need to be considered to ensure that it is carried out effectively and to meet the relevant rules and legislation. We will also address the difficult question of long term storage periods, a particular problem for Law Enforcement. Chapter 7. High Technology Crimes: Case Summaries. This chapter gives a range of cases that illustrate the types of incidents that may be encountered under the general grouping of high technology crimes. There are examples of cases that have been successful and other examples that highlight that a lack of good procedures can lead to considerable expense, loss of credibility and embarrassment. This chapter will also address the specific roles that the computer forensics laboratory and staff play in each of the cases cited. SECTION II: Creating a Computer Forensics Laboratory. This Section will provide a background explanation of Computer Forensics and address management issues related to the creation of a laboratory and a computer forensic investigations laboratory. The section will include an introduction to computer forensics and the types of investigation that may be encountered and will give advice on things that need to be considered when establishing a laboratory. The section will give advice on how to develop a workable business plan and an insight into where to locate the lab and how big it should be. The section also deals with the vitally important issue of quality assurance so that the efforts and risks taken are not wasted and the organisation gains and maintains a good reputation. Finally the section looks at staff selection, training and support and the regulations, standards and legislation that will need to be complied with if the lab is to be credible and successful. Chapter 8. Establishing and Managing a Computer Forensics Laboratory. The chapter will provide the reader with a discussion of the ";basic how-to"; of establishing and managing a computer forensics laboratory based on real-world experience. NOTE: It's based on the authors' many years of hands-on, real-world experiences in conducting computer-related crime investigations and establishing and managing computer forensics laboratories. It is not a theoretical discussion as has been the case by some inexperienced authors who have never conducted computer-related investigations nor established and managed computer forensics laboratories. Chapter 9. Scoping the requirement for the Laboratory. This chapter will draw upon the experience of the authors to provide guidance on how to scope out the requirement for the laboratory. This will include guidance on the potential throughput and the number of staff and the quantity and type of equipment that will be required to satisfy the anticipated workload. This chapter will also discuss how to identify computer forensics laboratory requirements and establishing the required budget to support the development of the laboratory. Chapter 10. Developing the Business Plan. This chapter will cover the development of the business plan for the creation and running of the computer forensics laboratory. Chapter 11. The location and size of the Laboratory. This chapter will address a range of issues that must be considered when deciding on the location of the laboratory. This will include the location of the laboratory in terms of the geographic location, the location with regard to the owning organisation and the location of the laboratory within a building. Chapter 12. Selecting the staff. This chapter will discuss a range of the issues that are related to the selection of the right staff for the laboratory. The chapter will include assessment of the suitability of staff, their qualifications and experience, their references and, if required their background checks and security vetting. The chapter will also deal with the requirement for the provision of support for staff including counseling and psychiatric assessment. Chapter 13. Training. This chapter will address the requirement for staff training and the achieving the balance between enough training to create and maintain an effective laboratory and excessive training, which is likely to cause unnecessary costs and to leave the organisation vulnerable to poaching of staff by rival companies or organisations. It will also address a strategy for the development of specialist areas within the teams. Specific entities will be addressed where staff members can get the needed training both online and through a number of identified lectures and conferences; as well as a sample staff training needs identification and project plan to address deficiencies and maintain currency in all aspects of the profession of computer forensics laboratory specialist. Chapter 14. Quality Assurance. This chapter will address the vitally important issue of Quality Assurance and will describe when it should be carried out, who should do it and to what standards. Chapter 15. Legislation, Regulation and Standards. This chapter will look at a range of the International, national and local legislation and regulations that must be addressed if the Laboratory is to fulfill its role and be cred

Related Items

-

of

  • OFFER

    USA Immigration Guide, 5e

    Ramon Carrion

    Starts At

    1007.0

    1361.0

    26% OFF

  • OFFER

    The Politics of Personal Law in South Asia: Identity, Nationalism and the Uniform Civil Code

    S. Ghosh Partha

    Starts At

    542.0

    695.0

    22% OFF

  • OFFER

    Nuremberg: Infamy on Trial

    Joseph Persico

    Starts At

    2170.0

    2524.0

    14% OFF

  • OFFER

    Poetry, Politics and Culture: Essays on Indian Texts and Contexts

    Kumar Akshaya

    Starts At

    654.0

    850.0

    23% OFF

  • OFFER

    Southern Postcolonialisms: The Global South and the 'New' Literary Representations

    Satpathy Sumany

    Starts At

    651.0

    795.0

    18% OFF

  • OFFER

    Corporate Governance Values & Ethics With Case Studies

    Neeru Vasishth

    Starts At

    214.0

    275.0

    22% OFF

  • OFFER

    Scene of the Crime

    Malcolm Rose

    Starts At

    342.0

    450.0

    24% OFF

  • OFFER

    THE LEGAL RIGHTS OF AN INDIAN WOMAN

    DR. K. L SHARMA

    Starts At

    123.0

    150.0

    18% OFF

  • OFFER

    Regulation of Medical Products

    John Griffin

    Starts At

    7606.0

    8359.0

    9% OFF

  • OFFER

    Legal Aspects of Forensics

    Danielle S. Sapse

    Starts At

    2052.0

    2811.0

    27% OFF

  • OFFER

    FreeBSD:the Complete Refrence

    Smith

    Starts At

    521.0

    695.0

    25% OFF

  • OFFER

    Optimizing Voice in ATM/IP Mobile Networks

    Juliet Bates

    Starts At

    3948.0

    5561.0

    29% OFF

  • OFFER

    ASP.NET: Developer's Guide

    Greg Buczek

    Starts At

    877.0

    1070.0

    18% OFF

  • Modeling and Asynchronous Distributed Simulation: Analyzing Complex Systems

    Sumit Ghosh

    Starts At

    795.0

  • OFFER

    Neural Networks and Artificial Intelligence for Biomedical Engineering

    Donna L. Hudson

    Starts At

    15918.0

    18510.0

    14% OFF

  • OFFER

    Godel, Escher, Bach: An Eternal Golden Braid, 20th Anniversary Edition

    Douglas R. Hofstadter

    Starts At

    813.0

    1099.0

    26% OFF

  • Biomedical Instrumentation and Measurements

    Weibell J Fred

    Starts At

    350.0

  • OFFER

    WritingBetter Requirements

    Ian Alexander

    Starts At

    8252.0

    9596.0

    14% OFF

  • OFFER

    Designing Concurrent, Distributed, and Real-Time Applications with UML

    Hassan Gomaa

    Starts At

    6079.0

    7999.0

    24% OFF

  • OFFER

    Artificial Life V: Proceedings of the Fifth International Workshop on the Synthesis and Simulation of Living Systems (Complex Adaptive Systems)

    Christopher G. Langton

    Starts At

    6602.0

    7677.0

    14% OFF

© 2016, All rights are reserved.

Subscribe to Our Newsletter

 

Are you sure you want to remove the item from your Bag?

Yes

No

Added to Your Wish List

OK

Your Shopping Bag

- 1 Item

null

Item

Delivery

Unit Price

Quantity

Sub Total

Shipping Charges : 0.0 Total Savings        : Grand Total :

Order Summary