Computers
Read books online ยป Computers ยป Beginner's Guide for Cybercrime Investigators by Nicolae Sfetcu (books to read for teens TXT) ๐Ÿ“–

Book online ยซBeginner's Guide for Cybercrime Investigators by Nicolae Sfetcu (books to read for teens TXT) ๐Ÿ“–ยป. Author Nicolae Sfetcu



1 2
Go to page:
Information that can be obtained from the computing system environment

Data files are not the only opportunities revealing information from computing systems. The category of data about the computing system includes recording data auditing, computer activity log, access control list, and other information that can not be printed.

Audit records are a means of tracking all activities affecting some data from the moment of their creation to disposal of the system. They are used by most management programs of computer networks. These records and computer log can provide information about who and when accessed the system, where and for how long, and the operations he made (changes, copying, deleting, etc.)

In addition to the audit records, a large number of companies have special software installed to monitor the use by an employee โ€˜s own information systems. These programs can provide information about the programs accessed, files used, emails sent and received, websites visited, etc.

Access control list (ACL) is associated with a file list that contains the names of users and groups that have permission to access and modify the file. The user access to those files depends on the employeeโ€™s duties or position in the company.

The information that can not be printed are also important sources for investigators. Such information are as follow: date and time attached to each file, information about the creation, access and modification of files (provided, for example, by the text editors), comments and notes not intended for printing, etc.

Table of Contents

Beginner's Guide for Cybercrime Investigators
Computing systems and storage media
   Computing devices
      Peripheral devices
      External drives for media storage
   Typology of data stored on specific supports โ€“ File systems
      Program that allows working with โ€ inactiveโ€ space
   Information that can be obtained from the computing system environment
Computer networks
   Copper wire in computer networks
   Optical fibers
   Wireless LAN
   Internet and Intranet
Software and services
   Client/server architecture
   Protocols and Standards
   Internet Services
      e-Mail
         Spam
      HTTP
      Web address - URL
      Web browsers
         Browser cookies
      Working with web pages
         Choosing your favorite web pages
         Keeping track of visited web pages
         Saving web pages
      Proxy servers
      Privacy on the Internet
   FTP
   Instant Messaging
   Peer-to-peer networks
Vulnerabilities
   The first attacks on the Internet
   Cybercrime
      Typologies of cyber attackers
         Classification of cyber attackers according to their skills and objectives
   Classification of risks and incidents in cyberworld
      Classification as a list of terms
      List of categories
      Categories of results
      Empirical lists
   Events, attacks and incidents
   Online security events, actions, and targets
      Actions
      Targets
   Attacks
      Tools
      Vulnerabilities
      Unauthorized results
Cybercrime laws
   The concept of "cybercrime"
Investigations
   Computer forensic investigations
   Digital evidence
   Digital sampling during investigations
   The suspect
   Witnesses in cybercrime
   Transporting of samples in laboratory
   Analysis of samples
   Preparing team members
   Computer tools
Convention on Cybercrime
   Preamble
   Chapter I โ€“ Use of terms
   Chapter II โ€“ Measures to be taken at the national level
      Section 1 โ€“ Substantive criminal law
         Title 1 โ€“ Offences against the confidentiality, integrity and availability of computer data and systems
         Title 2 โ€“ Computer-related offences
         Title 3 โ€“ Content-related offences
         Title 4 โ€“ Offences related to infringements of copyright and related rights
         Title 5 โ€“ Ancillary liability and sanctions
      Section 2 โ€“ Procedural law
         Title 1 โ€“ Common provisions
         Title 2 โ€“ Expedited preservation of stored computer data
         Title 3 โ€“ Production order
         Title 4 โ€“ Search and seizure of stored computer data
         Title 5 โ€“ Real-time collection of computer data
      Section 3 โ€“ Jurisdiction
   Chapter III โ€“ International co-operation
      Section 1 โ€“ General principles
         Title 1 โ€“ General principles relating to international co-operation
         Title 2 โ€“ Principles relating to extradition
         Title 3 โ€“ General principles relating to mutual assistance
         Title 4 โ€“ Procedures pertaining to mutual assistance requests in the absence of applicable international agreements
      Section 2 โ€“ Specific provisions
         Title 1 โ€“ Mutual assistance regarding provisional measures
         Title 2 โ€“ Mutual assistance regarding investigative powers
         Title 3 โ€“ 24/7 Network
   Chapter IV โ€“ Final provisions
Recommendation No. R (95) 13
   Appendix to Recommendation No. R (95) 13
      I. Search and seizure
      II. Technical surveillance
      III. Obligations to co-operate with the investigating authorities
      IV. Electronic evidence
      V. Use of encryption
      VI. Research, statistics and training
      VII. International co-operation
Rules for obtaining digital evidence by police officers
Standards in the field of digital forensics
Principles in digital evidence
Procedures model for the forensic examination
   Hard disk examination
Code of Ethics
Sources and references

Book

Beginner's Guide for Cybercrime Investigators

In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be observed immediately the apparent lack of box jewelry, penetration of an accounting server can be detected after a few months when all clients have given up the company services because of the stolen data came to competition and have helped it to make best deals.
Cybercrime is a phenomenon of our time, often reflected in the media. Forensic investigation of computer systems has a number of features that differentiate it fundamentally from other types of investigations. The computer itself is the main source of information for the investigator.

Digital edition (EPUB, Kindle, PDF): https://www.setthings.com/en/e-books/beginners-guide-cybercrime-investigators/ 

Print edition: https://www.createspace.com/5146499
Publication Date: June 17, 2014
ISBN-13: 978-1505344332
ISBN-10: 1505344336
ASIN: B01M17OB8V
BISAC: Computers / Internet / Security

About

Nicolae Sfetcu

Experience in the domains of engineering, Quality Assurance, electronics and Internet services (translation, web design, Internet marketing, web business solutions).

Owner and manager with MultiMedia

Developer of MultiMedia Network

Partner with MultiMedia in several European and national research and development projects

Project Coordinator for European Teleworking Development Romania (ETD)

Member of Rotary Club Bucuresti Atheneum

Cofounder of the regional association and president of the Mehedinti Branch of Romanian Association for Electronic Industry and Software

Initiator, cofounder and president of Romanian Association for Telework and Teleactivities

Member of Internet Society

Initiator, cofounder and ex-president of Romanian Teleworking Society

Cofounder and ex-president of the Mehedinti Branch of the General Association of Engineers in Romania

Physicist engineer - Bachelor of Physics, Major Nuclear Physics

Internal auditor for the Quality Management Systems

Specialist in industrial Nondestructive Testing

Attested for Quality Assurance

Hundreds of publications (books, e-books, articles), mainly from the IT domain.

Languages: Romanian, French, English

Services

web design, e-commerce and other web applications * internet marketing, SEO, online advertising, branding * software localization, English - Romanian - French translation * articles, desktop publishing, secretarial services * powerpoint, word and pdf presentation, image, audio and video editing * book and e-book conversion, editing and publishing , isbn

Contact

Tel./ WhatsApp: +40 745 526 896
Email: nicolae@sfetcu.com
Skype: nic01ae

MultiMedia: http://www.multimedia.com.ro/
Web Portal: https://www.setthings.com/

Facebook/Messenger: https://www.facebook.com/nicolae.sfetcu
Twitter: http://twitter.com/nicolae
LinkedIn: http://www.linkedin.com/in/nicolaesfetcu
Google Plus: https://www.google.com/+NicolaeSfetcu
YouTube: https://www.youtube.com/c/NicolaeSfetcu

Imprint

Publication Date: 04-09-2018

All Rights Reserved

1 2
Go to page:

Free ebook ยซBeginner's Guide for Cybercrime Investigators by Nicolae Sfetcu (books to read for teens TXT) ๐Ÿ“–ยป - read online now

Comments (0)

There are no comments yet. You can be the first!
Add a comment