Description
As society has become increasingly reliant on computers for document creation and information storage and transmittal, the amount of unauthorized theft of sensitive information stored in (and transmitted to/from) computers has increased correspondingly. This cutting-edge new book delivers a comprehensive treatment of the emerging field of computer forensics, making it a valuable resource for IT professionals in private businesses and government organizations, as well as lawyers and law enforcement professionals. It identifies the specific areas where sensitive and potentially incriminating data is hiding in personal computers, and explains how to go about truly removing this data because mere deletion or even overwriting does not accomplish this. You get a systematic process for installing operating systems and application software that will help to minimize the possibility of security compromises, and numerous specific steps that need to be taken to prevent the hostile exploitation of one's computer. This unique resource provides a method for ensuring that computers that are connected to the Internet are protected from malicious mobile code (code that can allow a remote hacker to read, remove, damage, or even add data to one's computer) and from the new fashion of adware/spyware. Moreover, you learn how to detect whether advanced investigative tools, such as keystroke storing and relaying hardware and software, are in use in a computer; you also learn of commercially available capabilities for intercepting radio signals unintentionally radiated by a computer. Other critical topics include the pitfalls of encryption and how to use it effectively, the practical aspects of online anonymity, and the current legal issues that pertain to the use of computers. Features over 70 illustrations that emphasize key points throughout the book.
Table Of Contents
Introduction.; Computer Forensics - What Is It? What Can Be Retrieved from a Computer? Why Is There Forensic Evidence Left Behind in a Computer? How Can Information Be Retrieved from One's Computer? How to Protect One's Computer from Leaving Sensitive Data Behind? Forensic Evidence Left Behind During and After Being Online on the Internet.; Legal Issues - Chain of Custody Issues to Challenge Allegations by Prosecution. The U.S. Legal Issues Related to Subpoenaed and Confiscated Computer Hardware. Other Countries' Legal Issues Related to Subpoenaed and Confiscated Computer Hardware.; Societal Issues - The Demise of the Privacy of Computerized Records in the Name of Law and Order. Privacy Policies by Commercial Keepers of Databases and What they Mean. Future Trends.; Staying Current - Sources on the Internet. Organizations.; Detailed Technical References: - Software for Doing Computer Forensics. Software for Defeating Computer Forensics; . Encryption Software. Steganography Software. Software for Keystroke Capture. Software for Detecting Keystroke Capture. Preventing Compromising Emanations from One's Computer.;
Author
-
Michael A. Caloyannides
Michael A. Caloyannides is a senior fellow at Mitretek Systems in McLean, VA. He received his Ph.D. in electrical engineering, applied mathematics and philosophy from California Institute of Technology. He is an adjunct professor at two renown universities and a regular columnist and associate editor for IEEE Computer Society's 'Security and Privacy'ù magazine.