Details

Practical Cyber Intelligence


Practical Cyber Intelligence

A Hands-on Guide to Digital Forensics
1. Aufl.

von: Adam Tilmar Jakobsen

83,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 31.07.2024
ISBN/EAN: 9781394256105
Sprache: englisch
Anzahl Seiten: 240

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process</b> <p><i>Practical Cyber Intelligence</i> provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in the field of cyber investigation and cyber forensics to collect, preserve, and analyze digital evidence, enabling readers to understand the digital landscape and analyze legacy devices, current models, and models that may be created in the future. Readers will learn how to determine what evidence exists and how to find it on a device, as well as what story it tells about the activities on the device. <p>Over 100 images and tables are included to aid in reader comprehension, and case studies are included at the end of the book to elucidate core concepts throughout the text. <p>To get the most value from this book, readers should be familiar with how a computer operates (e.g., CPU, RAM, and disk), be comfortable interacting with both Windows and Linux operating systems as well as Bash and PowerShell commands and have a basic understanding of Python and how to execute Python scripts. <p><i>Practical Cyber Intelligence</i> includes detailed information on: <ul><li>OSINT, the method of using a device’s information to find clues and link a digital avatar to a person, with information on search engines, profiling, and infrastructure mapping</li><li>Window forensics, covering the Windows registry, shell items, the event log and much more </li><li>Mobile forensics, understanding the difference between Android and iOS and where key evidence can be found on the device </li></ul> <p>Focusing on methodology that is accessible to everyone without any special tools, <i>Practical Cyber Intelligence</i> is an essential introduction to the topic for all professionals looking to enter or advance in the field of cyber investigation, including cyber security practitioners and analysts and law enforcement agents who handle digital evidence.
<p>About the Author xviii</p> <p>Preface xix</p> <p>Acknowledgments xx</p> <p>Introduction xxi</p> <p><b>1 Intelligence Analysis 1</b></p> <p>1.1 Intelligence Life Cycle 1</p> <p>1.2 Cyber Threat Intelligence Frameworks 10</p> <p>1.3 Summary 13</p> <p><b>2 Digital Forensics 15</b></p> <p>2.1 Device Collection 16</p> <p>2.2 Preservation 17</p> <p>2.3 Acquisition 18</p> <p>2.4 Processing 19</p> <p>2.5 Analysis 20</p> <p>2.6 Documentation and Reporting 21</p> <p>2.7 Summary 22</p> <p><b>3 Disk Forensics 23</b></p> <p>3.1 Acquisition 23</p> <p>3.2 Preparation 25</p> <p>3.3 Analysis 25</p> <p>3.4 File and Data Carving 31</p> <p>3.5 Summary 32</p> <p><b>4 Memory Forensics 33</b></p> <p>4.1 Acquisition 34</p> <p>4.2 Analysis 35</p> <p>4.3 Summary 38</p> <p><b>5 SQLite Forensics 39</b></p> <p>5.1 Analyzing 40</p> <p>5.2 Summary 43</p> <p><b>6 Windows Forensics 45</b></p> <p>6.1 New Technology File System (NTFS) 45</p> <p>6.2 Acquisition 51</p> <p>6.3 Analysis 52</p> <p>6.4 Evidence Location 60</p> <p>6.5 Summary 93</p> <p><b>7 macOS Forensics 95</b></p> <p>7.1 File System 95</p> <p>7.2 Security 97</p> <p>7.3 Acquisition 98</p> <p>7.4 Analysis 100</p> <p>7.5 Evidence Location 100</p> <p>7.6 Summary 104</p> <p><b>8 Linux Forensics 105</b></p> <p>8.1 File System 105</p> <p>8.2 Security 107</p> <p>8.3 Acquisition 108</p> <p>8.4 Analysis 109</p> <p>8.5 Evidence Location 109</p> <p>8.6 Summary 115</p> <p><b>9 iOS 117</b></p> <p>9.1 File System 117</p> <p>9.2 Security 118</p> <p>9.3 Applications 119</p> <p>9.4 Acquisition 120</p> <p>9.5 iCloud 122</p> <p>9.6 Analysis 122</p> <p>9.7 Evidence of Location 124</p> <p>9.8 Summary 134</p> <p><b>10 Android 137</b></p> <p>10.1 File Systems 137</p> <p>10.2 Security 137</p> <p>10.3 Application 138</p> <p>10.4 Acquisition 138</p> <p>10.5 Analysis 145</p> <p>10.6 Evidence of Location 146</p> <p><b>11 Network Forensics 153</b></p> <p>11.1 Acquisition 153</p> <p>11.2 Analysis 158</p> <p>11.3 Summary 165</p> <p><b>12 Malware Analysis 167</b></p> <p>12.1 Acquiring Malware Samples 168</p> <p>12.2 Handling Malware Samples 169</p> <p>12.3 Analysis 170</p> <p>12.4 Summary 174</p> <p><b>13 OSINT 177</b></p> <p>13.1 Methodology 178</p> <p>13.2 Documentation 179</p> <p>13.3 Securing Yourself (OPSEC) 180</p> <p>13.4 Search Engines 182</p> <p>13.5 Profiling 184</p> <p>13.6 Hunt for Data 189</p> <p>13.7 Infrastructure Mapping 194</p> <p>13.8 Automation of OSINT Tasks 208</p> <p>13.9 Summary 209</p> <p><b>14 Case Studies 211</b></p> <p>14.1 Case of “The Missing Author” 211</p> <p>14.2 The Insider Threat 212</p> <p><b>15 Ending 213</b></p> <p>15.1 What’s the Next Step? 213</p> <p>Index 215</p>
<p><b>Adam Tilmar Jakobsen</b> works for the Danish National Police Agency’s special crime unit hunting down cyber criminals. Throughout his career he has worked on international cases with Europol and the FBI. Adam’s journey into cybersecurity and intelligence began in the Danish Army Intelligence, where he honed his skills in SIGINT, OSINT, HUMINT, and all-source intelligence. In this role, he executed a wide range of defense, intelligence, and attack missions. Transitioning to Bluewater Shipping, Adam initially served as a Solution Architect before pivoting towards information security, where he oversaw critical security operations.
<p><b>Overview of the latest techniques and practices used in digital forensics and how to apply them to the investigative process</b> <p><i>Practical Cyber Intelligence</i> provides a thorough and practical introduction to the different tactics, techniques, and procedures that exist in the field of cyber investigation and cyber forensics to collect, preserve, and analyze digital evidence, enabling readers to understand the digital landscape and analyze legacy devices, current models, and models that may be created in the future. Readers will learn how to determine what evidence exists and how to find it on a device, as well as what story it tells about the activities on the device. <p>Over 100 images and tables are included to aid in reader comprehension, and case studies are included at the end of the book to elucidate core concepts throughout the text. <p>To get the most value from this book, readers should be familiar with how a computer operates (e.g., CPU, RAM, and disk), be comfortable interacting with both Windows and Linux operating systems as well as Bash and PowerShell commands and have a basic understanding of Python and how to execute Python scripts. <p><i>Practical Cyber Intelligence</i> includes detailed information on: <ul><li>OSINT, the method of using a device’s information to find clues and link a digital avatar to a person, with information on search engines, profiling, and infrastructure mapping</li><li>Window forensics, covering the Windows registry, shell items, the event log and much more </li><li>Mobile forensics, understanding the difference between Android and iOS and where key evidence can be found on the device </li></ul> <p>Focusing on methodology that is accessible to everyone without any special tools, <i>Practical Cyber Intelligence</i> is an essential introduction to the topic for all professionals looking to enter or advance in the field of cyber investigation, including cyber security practitioners and analysts and law enforcement agents who handle digital evidence.

Diese Produkte könnten Sie auch interessieren:

From Grids To Service and Pervasive Computing
From Grids To Service and Pervasive Computing
von: Thierry Priol, Marco Vanneschi
PDF ebook
96,29 €
Grid Computing
Grid Computing
von: Sergei Gorlatch, Paraskevi Fragopoulou, Thierry Priol
PDF ebook
149,79 €
Autonomic Communication
Autonomic Communication
von: Athanasios V. Vasilakos, Manish Parashar, Stamatis Karnouskos, Witold Pedrycz
PDF ebook
149,79 €