
Başlık:
Practical cyber intelligence : a hands-on guide to digital forensics
Yazar:
Jakobsen, Adam Tilmar, author.
ISBN:
9781394256129
9781394256105
9781394256112
Fiziksel Tanımlama:
1 online resource (xxii, 218 pages) : illustrations (some color)
Genel Not:
Includes index.
İçerik:
About the Author xviii -- Preface xix -- Acknowledgments xx -- Introduction xxi -- 1 Intelligence Analysis 1 -- 1.1 Intelligence Life Cycle 1 -- 1.2 Cyber Threat Intelligence Frameworks 10 -- 1.3 Summary 13 -- 2 Digital Forensics 15 -- 2.1 Device Collection 16 -- 2.2 Preservation 17 -- 2.3 Acquisition 18 -- 2.4 Processing 19 -- 2.5 Analysis 20 -- 2.6 Documentation and Reporting 21 -- 2.7 Summary 22 -- 3 Disk Forensics 23 -- 3.1 Acquisition 23 -- 3.2 Preparation 25 -- 3.3 Analysis 25 -- 3.4 File and Data Carving 31 -- 3.5 Summary 32 -- 4 Memory Forensics 33 -- 4.1 Acquisition 34 -- 4.2 Analysis 35 -- 4.3 Summary 38 -- 5 SQLite Forensics 39 -- 5.1 Analyzing 40 -- 5.2 Summary 43 -- 6 Windows Forensics 45 -- 6.1 New Technology File System (NTFS) 45 -- 6.2 Acquisition 51 -- 6.3 Analysis 52 -- 6.4 Evidence Location 60 -- 6.5 Summary 93 -- 7 macOS Forensics 95 -- 7.1 File System 95 -- 7.2 Security 97 -- 7.3 Acquisition 98 -- 7.4 Analysis 100 -- 7.5 Evidence Location 100 -- 7.6 Summary 104 -- 8 Linux Forensics 105 -- 8.1 File System 105 -- 8.2 Security 107 -- 8.3 Acquisition 108 -- 8.4 Analysis 109 -- 8.5 Evidence Location 109 -- 8.6 Summary 115 -- 9 iOS 117 -- 9.1 File System 117 -- 9.2 Security 118 -- 9.3 Applications 119 -- 9.4 Acquisition 120 -- 9.5 iCloud 122 -- 9.6 Analysis 122 -- 9.7 Evidence of Location 124 -- 9.8 Summary 134 -- 10 Android 137 -- 10.1 File Systems 137 -- 10.2 Security 137 -- 10.3 Application 138 -- 10.4 Acquisition 138 -- 10.5 Analysis 145 -- 10.6 Evidence of Location 146 -- 11 Network Forensics 153 -- 11.1 Acquisition 153 -- 11.2 Analysis 158 -- 11.3 Summary 165 -- 12 Malware Analysis 167 -- 12.1 Acquiring Malware Samples 168 -- 12.2 Handling Malware Samples 169 -- 12.3 Analysis 170 -- 12.4 Summary 174 -- 13 OSINT 177 -- 13.1 Methodology 178 -- 13.2 Documentation 179 -- 13.3 Securing Yourself (OPSEC) 180 -- 13.4 Search Engines 182 -- 13.5 Profiling 184 -- 13.6 Hunt for Data 189 -- 13.7 Infrastructure Mapping 194 -- 13.8 Automation of OSINT Tasks 208 -- 13.9 Summary 209 -- 14 Case Studies 211 -- 14.1 Case of “The Missing Author” 211 -- 14.2 The Insider Threat 212 -- 15 Ending 213 -- 15.1 What’s the Next Step? 213 -- Index 215.
Özet:
"Cyber forensics is the process of using forensic and investigative techniques to identify and analyze digital events. This involves collecting and analyzing digital evidence from various sources, such as computers, networks, and mobile devices, to identify perpetrators. When discussing cyber investigation, many people often think about high-tech crimes like ransomware, DDoS, or BEC. However, it extends beyond these examples, as it also includes traditional crimes such as theft, fraud, or assault, which can leave behind digital evidence that can be collected and analyzed. In these cases, IT is merely a component of the event. As technology becomes increasingly integrated into our daily lives, the information that we can collect from devices, OSINT, and other sources becomes a critical part of any investigation, allowing us to map out a person's life."-- Provided by publisher.
Notlar:
John Wiley and Sons
Tür:
Elektronik Erişim:
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394256129Kopya:
Rafta:*
Kütüphane | Materyal Türü | Demirbaş Numarası | Yer Numarası | Durumu/İade Tarihi | Materyal Ayırtma |
|---|---|---|---|---|---|
Arıyor... | E-Kitap | 599262-1001 | HV8079 .C65 J633 2024 | Arıyor... | Arıyor... |
