
Cyber Forensics
Beschreibung
Weitere Details
Weitere Ausgaben
Personen
Inhalt
- Intro
- Cyber Forensics: From Data to Digital Evidence
- Contents
- Preface
- Acknowledgments
- Chapter 1: The Fundamentals of Data
- Base 2 Numbering System: Binary and Character Encoding
- Communication in a Two-State Universe
- Electricity and Magnetism
- Building Blocks: The Origins of Data
- Growing the Building Blocks of Data
- Moving Beyond Base 2
- American Standard Code for Information Interchange
- Character Codes: The Basis for Processing Textual Data
- Extended ASCII and Unicode
- Summary
- Notes
- Chapter 2: Binary to Decimal
- American Standard Code for Information Interchange
- Computer as a Calculator
- Why Is This Important in Forensics?
- Data Representation
- Converting Binary to Decimal
- Conversion Analysis
- A Forensic Case Example: An Application of the Math
- Decimal to Binary: Recap for Review
- Summary
- Chapter 3: The Power of HEX: Finding Slivers of Data
- What the HEX?
- Bits and Bytes and Nibbles
- Nibbles and Bits
- Binary to HEX Conversion
- Binary (HEX) Editor
- The Needle within the Haystack
- Summary
- Notes
- Chapter 4: Files
- Opening
- Files, File Structures, and File Formats
- File Extensions
- Changing a File's Extension to Evade Detection
- Files and the HEX Editor
- File Signature
- ASCII Is Not Text or HEX
- Value of File Signatures
- Complex Files: Compound, Compressed, and Encrypted Files
- Why Do Compound Files Exist?
- Compressed Files
- Forensics and Encrypted Files
- The Structure of Ciphers
- Summary
- Notes
- Appendix 4A: Common File Extensions
- Appendix 4B: File Signature Database
- Appendix 4C: Magic Number Definition
- Appendix 4D: Compound Document Header
- Chapter 5: The Boot Process and the Master Boot Record (MBR)
- Booting Up
- Primary Functions of the Boot Process
- Forensic Imaging and Evidence Collection
- Summarizing the BIOS
- BIOS Setup Utility: Step by Step
- The Master Boot Record (MBR)
- Partition Table
- Hard Disk Partition
- Summary
- Notes
- Chapter 6: Endianness and the Partition Table
- The Flavor of Endianness
- Endianness
- The Origins of Endian
- Partition Table within the Master Boot Record
- Summary
- Notes
- Chapter 7: Volume versus Partition
- Tech Review
- Cylinder, Head, Sector, and Logical Block Addressing
- Volumes and Partitions
- Summary
- Notes
- Chapter 8: File Systems-FAT 12/16
- Tech Review
- File Systems
- Metadata
- File Allocation Table (FAT) File System
- Slack
- HEX Review Note
- Directory Entries
- File Allocation Table (FAT)
- How Is Cluster Size Determined?
- Expanded Cluster Size
- Directory Entries and the FAT
- FAT Filing System Limitations
- Directory Entry Limitations
- Summary
- Appendix 8A: Partition Table Fields
- Appendix 8B: File Allocation Table Values
- Appendix 8C: Directory Entry Byte Offset Description
- Appendix 8D: FAT 12/16 Byte Offset Values
- Appendix 8E: FAT 32 Byte Offset Values
- Appendix 8F: The Power of 2
- Chapter 9: File Systems-NTFS and Beyond
- New Technology File System
- Partition Boot Record
- Master File Table
- NTFS Summary
- exFAT
- Alternative Filing System Concepts
- Summary
- Notes
- Appendix 9A: Common NTFS System Defined Attributes
- Chapter 10: Cyber Forensics: Investigative Smart Practices
- The Forensic Process
- Forensic Investigative Smart Practices
- Step 1: The Initial Contact, the Request
- Step 2: Evidence Handling
- Step 3: Acquisition of Evidence
- Step 4: Data Preparation
- Time
- Summary
- Note
- Chapter 11: Time and Forensics
- What Is Time?
- Network Time Protocol
- Timestamp Data
- Keeping Track of Time
- Clock Models and Time Bounding: The Foundations of Forensic Time
- MS-DOS 32-Bit Timestamp: Date and Time
- Date Determination
- Time Determination
- Time Inaccuracy
- Summary
- Notes
- Chapter 12: Investigation: Incident Closure
- Forensic Investigative Smart Practices
- Step 5: Investigation (Continued)
- Step 6: Communicate Findings
- Characteristics of a Good Cyber Forensic Report
- Report Contents
- Step 7: Retention and Curation of Evidence
- Step 8: Investigation Wrap-Up and Conclusion
- Investigator's Role as an Expert Witness
- Summary
- Notes
- Chapter 13: A Cyber Forensic Process Summary
- Binary
- Binary-Decimal-ASCII
- Data Versus Code
- HEX
- From Raw Data to Files
- Accessing Files
- Endianness
- Partitions
- File Systems
- Time
- The Investigation Process
- Summary
- Appendix: Forensic Investigations, ABC Inc.
- Glossary
- About the Authors
- Index
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist.
Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.
Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.