Preface |
|
xi | |
Introduction |
|
xiii | |
About the Author |
|
xv | |
Acknowledgments |
|
xvii | |
|
SECTION A DIGITAL FORENSICS |
|
|
|
Chapter 1 Understanding Digital Forensics |
|
|
3 | (14) |
|
|
3 | (1) |
|
History of Digital Crime and Forensics |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
The Future (2015 and Beyond) |
|
|
7 | (1) |
|
Digital Forensics Overview |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
Collecting Digital Evidence |
|
|
10 | (3) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
Types of Forensic Investigations |
|
|
13 | (1) |
|
Digital Forensic Resources |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (2) |
|
Chapter 2 Investigative Process Models |
|
|
17 | (6) |
|
|
17 | (1) |
|
|
17 | (4) |
|
Digital Forensic Readiness Model |
|
|
21 | (1) |
|
|
22 | (1) |
|
Chapter 3 Evidence Management |
|
|
23 | (22) |
|
|
23 | (1) |
|
|
23 | (2) |
|
|
25 | (9) |
|
Information Security Management |
|
|
25 | (5) |
|
|
30 | (2) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (4) |
|
|
34 | (4) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
40 | (5) |
|
SECTION B DIGITAL FORENSIC READINESS |
|
|
|
Chapter 4 Understanding Forensic Readiness |
|
|
45 | (8) |
|
|
45 | (1) |
|
Digital Forensics and Information Security |
|
|
45 | (2) |
|
|
46 | (1) |
|
|
46 | (1) |
|
What Is Forensic Readiness? |
|
|
47 | (1) |
|
Cost and Benefit of Forensic Readiness |
|
|
48 | (3) |
|
|
49 | (1) |
|
|
49 | (2) |
|
Implementing Forensic Readiness |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
Chapter 5 Define Business Risk Scenarios |
|
|
53 | (10) |
|
|
53 | (1) |
|
|
53 | (2) |
|
Forensic Readiness Scenarios |
|
|
55 | (5) |
|
Scenario #1 Reducing the Impact of Cybercrime |
|
|
55 | (1) |
|
Scenario #2 Validating the Impact of Cybercrime or Disputes |
|
|
56 | (2) |
|
Scenario #3 Producing Evidence to Support Organizational Disciplinary Issues |
|
|
58 | (1) |
|
Scenario #4 Demonstrating Compliance With Regulatory or Legal Requirements |
|
|
59 | (1) |
|
Scenario #5 Effectively Managing the Release of Court Ordered Data |
|
|
59 | (1) |
|
Scenario #6 Supporting Contractual and/or Commercial Agreements |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (2) |
|
Chapter 6 Identify Potential Data Sources |
|
|
63 | (10) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
64 | (6) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (3) |
|
External Data Considerations |
|
|
70 | (1) |
|
|
70 | (1) |
|
Forensics in the System Development Life Cycle |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
Chapter 7 Determine Collection Requirements |
|
|
73 | (12) |
|
|
73 | (1) |
|
|
73 | (2) |
|
Evidence Collection Factors |
|
|
75 | (6) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
Correlation and Association |
|
|
78 | (1) |
|
Corroboration and Redundancy |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
Data Security Requirements |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (3) |
|
Chapter 8 Establish Legal Admissibility |
|
|
85 | (10) |
|
|
85 | (1) |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
87 | (6) |
|
|
88 | (1) |
|
|
88 | (3) |
|
|
91 | (2) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
Chapter 9 Establish Secure Storage and Handling |
|
|
95 | (10) |
|
|
95 | (1) |
|
Secure Storage Attributes |
|
|
95 | (4) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
Administrative Governance Foundations |
|
|
99 | (3) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
Incident and Investigation Response |
|
|
101 | (1) |
|
|
101 | (1) |
|
Backup and Restoration Strategies |
|
|
102 | (2) |
|
Near Real-Time Data Replication |
|
|
103 | (1) |
|
|
103 | (1) |
|
Data Restoration From Online Backup Media |
|
|
103 | (1) |
|
Data Restoration From Off-line Backup Media |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
Chapter 10 Enable Targeted Monitoring |
|
|
105 | (8) |
|
|
105 | (1) |
|
What is (Un)Acceptable Activity? |
|
|
105 | (1) |
|
Traditional Security Monitoring |
|
|
106 | (1) |
|
Modern Security Monitoring |
|
|
107 | (1) |
|
|
108 | (2) |
|
|
109 | (1) |
|
|
109 | (1) |
|
Specification-Based Detection |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (2) |
|
Chapter 11 Map Investigative Workflows |
|
|
113 | (16) |
|
|
113 | (1) |
|
Incident Management Lifecycle |
|
|
113 | (2) |
|
Integrating the Digital Forensic Readiness Model |
|
|
114 | (1) |
|
Incident Handling and Response |
|
|
115 | (12) |
|
|
115 | (6) |
|
|
121 | (3) |
|
|
124 | (2) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
Chapter 12 Establish Continuing Education |
|
|
129 | (8) |
|
|
129 | (1) |
|
|
129 | (4) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (2) |
|
Balancing Business Versus Technical Learning |
|
|
135 | (1) |
|
|
136 | (1) |
|
Chapter 13 Maintain Evidence-Based Reporting |
|
|
137 | (6) |
|
|
137 | (1) |
|
Importance of Factual Reports |
|
|
137 | (1) |
|
|
138 | (1) |
|
Creating Understandable Reports |
|
|
139 | (1) |
|
Arranging Written Reports |
|
|
139 | (2) |
|
Inculpatory and Exculpatory Evidence |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
Chapter 14 Ensure Legal Review |
|
|
143 | (8) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (2) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (2) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (2) |
|
Chapter 15 Accomplishing Forensic Readiness |
|
|
151 | (6) |
|
|
151 | (1) |
|
Maintain a Business-Centric Focus |
|
|
151 | (1) |
|
Do Not Reinvent the Wheel |
|
|
152 | (1) |
|
Understand the Costs and Benefits |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (4) |
|
|
|
Appendix A Investigative Process Models |
|
|
157 | (20) |
|
Appendix B Education and Professional Certifications |
|
|
177 | (14) |
|
Appendix C Tool and Equipment Validation Program |
|
|
191 | (8) |
|
Appendix D Service Catalog |
|
|
199 | (4) |
|
Appendix E Cost--Benefit Analysis |
|
|
203 | (12) |
|
Appendix F Building Taxonomy |
|
|
215 | (6) |
|
Appendix G Risk Assessment |
|
|
221 | (16) |
|
Appendix H Threat Modeling |
|
|
237 | (10) |
|
Appendix I Data Warehouse Introduction |
|
|
247 | (12) |
|
Appendix J Requirements Analysis |
|
|
259 | (6) |
|
Appendix K Investigative Workflow |
|
|
265 | (8) |
|
|
|
Template A Test Case Document |
|
|
273 | (8) |
|
Template B Investigator Logbook |
|
|
281 | (2) |
|
Template C Chain of Custody Tracking Form |
|
|
283 | (4) |
|
Template D Investigative Final Report |
|
|
287 | (4) |
|
Template E Service Catalog |
|
|
291 | (2) |
|
Template F Business Case Document |
|
|
293 | (10) |
|
Template G Net Present Value |
|
|
303 | (2) |
|
Template H Threat/Risk Assessment Report |
|
|
305 | (6) |
|
Template I Data Source Inventory Matrix |
|
|
311 | (2) |
|
Template J Project Charter Document |
|
|
313 | (14) |
|
Template K Requirements Specification Document |
|
|
327 | (8) |
Bibliography |
|
335 | (8) |
Index |
|
343 | |