Amazon cover image
Image from Amazon.com
Image from Google Jackets

Cyber Forensics: Examining Emerging and Hybrid Technologies / Albert J. Marcella.

By: Material type: TextTextLanguage: English Publication details: Florida : CRC Press, 2022.Edition: 1st edDescription: xvii, 363 p.: ill. ; 24 cmISBN:
  • 9780367524241
  • 9780367524180
  • 9781003057888
Uniform titles:
  • Cyber Forensics: Examining Emerging and Hybrid Technologies
Subject(s): DDC classification:
  • 23 362.2502 MAR
Contents:
Preface Acknowledgements Editor Contributors 1 Cyber forensics: Compliance and auditing DOUGLAS MENENDEZ 2 IoT and the role of cyber forensics PATRICK WILDS 3 Cyber forensics: Examining commercial Unmanned Aircraft Systems (UASs) and Unmanned Aerial Vehicles (UAVs) ALBERT J. MARCELLA 4 Cloud forensics RONALD L. KRUTZ 5 Forensics of the digital social triangle with an emphasis on Deepfakes JAMES CURTIS 6 Operational technology, industrial control systems, and cyber forensics ALBERT J. MARCELLA 7 Cyber forensics and risk management DOUGLAS MENENDEZ 8 Mobile device forensics: An introduction ANDREW HRENAK 9 Forensic accounting and the use of E-discovery and cyber forensics RICHARD DIPPEL 10 Cyber forensic tools and utilities DOUGLAS MENENDEZ Index
Summary: Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today’s and tomorrow’s emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Text Books Text Books CUTN Central Library Social Sciences Non-fiction 362.2502 MAR (Browse shelf(Opens below)) Available 47802

Preface

Acknowledgements

Editor

Contributors

1 Cyber forensics: Compliance and auditing

DOUGLAS MENENDEZ

2 IoT and the role of cyber forensics

PATRICK WILDS

3 Cyber forensics: Examining commercial Unmanned Aircraft Systems (UASs) and Unmanned Aerial Vehicles (UAVs)

ALBERT J. MARCELLA

4 Cloud forensics

RONALD L. KRUTZ

5 Forensics of the digital social triangle with an emphasis on Deepfakes

JAMES CURTIS

6 Operational technology, industrial control systems, and cyber forensics

ALBERT J. MARCELLA

7 Cyber forensics and risk management

DOUGLAS MENENDEZ

8 Mobile device forensics: An introduction

ANDREW HRENAK

9 Forensic accounting and the use of E-discovery and cyber forensics

RICHARD DIPPEL

10 Cyber forensic tools and utilities

DOUGLAS MENENDEZ

Index

Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations.

A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today’s and tomorrow’s emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.

There are no comments on this title.

to post a comment.

Powered by Koha