Investigating computer related crime 2nd ed Edition Stephenson - Quickly download the ebook in PDF format for unlimited reading
Investigating computer related crime 2nd ed Edition Stephenson - Quickly download the ebook in PDF format for unlimited reading
https://ebookultra.com/download/the-system-of-the-world-1st-ed-
edition-neal-stephenson/
https://ebookultra.com/download/a-textbook-of-general-practice-2nd-
edition-anne-stephenson/
https://ebookultra.com/download/crime-and-punishment-a-history-of-the-
criminal-justice-system-2nd-ed-edition-roth/
Possession Jung s Comparative Anatomy of the Psyche 2nd
Edition Stephenson
https://ebookultra.com/download/possession-jung-s-comparative-anatomy-
of-the-psyche-2nd-edition-stephenson/
https://ebookultra.com/download/logic-in-computer-science-modelling-
and-reasoning-about-systems-2nd-ed-edition-michael-huth/
https://ebookultra.com/download/computer-graphics-2nd-edition-a-p-
godse/
https://ebookultra.com/download/art-crime-2nd-edition-john-e-conklin/
Investigating computer related crime 2nd ed Edition
Stephenson Digital Instant Download
Author(s): Stephenson, Peter; Gilbert, Keith
ISBN(s): 9781482218435, 1420003704
Edition: 2nd ed
File Details: PDF, 5.43 MB
Year: 2013
Language: english
Investigating
Computer-Related
Crime Second Edition
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to
copyright holders if permission to publish in this form has not been obtained. If any copyright material has
not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit-
ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented,
including photocopying, microfilming, and recording, or in any information storage or retrieval system,
without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.
com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the CCC,
a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
Peter Stephenson
Keith Gilbert
Introduction xvii
About the Authors xxiii
Section I
THE NATURE OF CYBERCRIME
3 Malware Attacks 41
A Little Background to Get Us Started 41
Viruses, Trojan Horses, and Worms 42
Types of Viruses 43
File Infector 43
Resident Program Infector 44
Boot Sector Infector 44
Multipartite Virus 44
Dropper 44
Stealth Virus 45
Companion Virus 45
Polymorphic Virus 45
Mutation Engine 46
Detection Methods 46
Pattern Scanners 46
Integrity Checkers 47
Behavior Blockers 47
Trojan Horses 48
Worms 50
Logic Bombs 50
Modifying System Files 51
Spyware, Adware, and Scareware 51
Botnets 52
Responding to Rogue Code Attacks 52
Viruses 53
Trojan Horses and Logic Bombs 54
Protection of Extended Mission-Critical Computer Systems 55
Postattack Inspection for Rogue Code 57
Summary 57
Discussion Questions 58
Reference 58
Dumping Core 63
Symptoms of a Surgical Strike 64
Panics 64
Other Surgical Attacks 65
Masquerading 65
User Masquerades 66
System Masquerades 67
Spoofing 68
E-Mail 68
Web Site 69
IP Spoofing 70
Case Study: The Case of the Cyber Surgeon 71
Symptoms of Shotgun Blasts 72
“Up Yours”: Mail Bombs 72
Flooding Attacks 74
Summary 74
Discussion Questions 75
References 75
Section II
INVESTIGATING CYBERCRIME
Discussion Questions 98
References 99
Section III
PREPARING FOR CYBERCRIME
Appendix A 343
Appendix B 353
Appendix C 357
That said, the primary difference between this edition and the rest of
those in the field is that this edition, like the first edition, focuses on the
investigative process rather than taking a particular subfield of digital foren-
sics and treating it in depth. There are plenty of good references from such
respected practitioners and educators, such as Eoghan Casey, Brian Carrier,
and a host of others, that cover those types of details. This book considers the
investigative process and expects that the reader will turn to these other spe-
cialists for specific forensic details. Simply, the place for this edition on your
bookshelf is as the cornerstone of your own investigative process and skills,
augmented and amplified by offerings from specialized authors.
But, back to the notion of digital (or as we hear more and more fre-
quently—cyber) investigation and the focus of this book. Today, when events
occur in cyberspace, they take on unique characteristics. Dr. K. Jaishankar
has put forward the notion of the Space Transition Theory (discussed and
cited later in this book). This says, in simple terms, that crime in cyberspace
affects physical space and conversely. This begins us thinking about the
connection between physical and digital investigation and the connections
between the two. The end-to-end process (begun in the first edition) now
expands in this edition to include cybercrime assessment. The field of inter-
est for the digital investigator no longer is limited to the computer and pick-
ing child pornography off the hard disk with a virtual magnifying glass and
tweezers. Now we have an increasing concern about sophisticated financial
fraud, theft, malware, and, yes, believe it or not, murder and war.
These expanded issues require an expanded field of consideration and
that is what this edition is all about—investigating computer-related crime,
not just performing computer forensics. Today’s digital investigator is quite
likely also to be his or her own digital forensic analyst, thus the lines between
digital investigative and digital forensic tasks continue to blur. This book pro-
vides the basis for the complete digital investigator to learn his or her trade
with the clear understanding that it is not the entire digital forensic story.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookultra.com