Digital Forensics for Network Internet and Cloud Computing A Forensic Evidence Guide for Moving Targets and Data 1st Edition by Terrence V Lillard – Ebook PDF Instant Download/Delivery: 1597495379, 9781597495370
Full download Digital Forensics for Network Internet and Cloud Computing A Forensic Evidence Guide for Moving Targets and Data 1st Edition after payment
Product details:
ISBN 10: 1597495379
ISBN 13: 9781597495370
Author: Terrence V Lillard
Digital Forensics for Network Internet and Cloud Computing A Forensic Evidence Guide for Moving Targets and Data 1st Table of contents:
PART I INTRODUCTION
CHAPTER 1. What Is Network Forensics?
Introduction to Cloud Computing
Introduction to the Incident Response Process
Investigative and Forensics Methodologies
Where Network Forensics Fits In
Summary
References
PART II GATHERING EVIDENCE
CHAPTER 2. Capturing Network Traffic
The Importance of DHCP Logs
Using tcpdump/WinDump
Limitations of tcpdump
tcpdump Command Line
Troubleshooting tcpdump
Using Wireshark
Wireshark GUI
Limitations of Wireshark
Limitations of Using Libpcap and Derivatives
Wireshark Utilities
TShark
Rawshark
Dumpcap
Mergecap
Editcap
Text2pcap
Using SPAN Ports or TAPS
SPAN Port Issues
Network Tap
Using Fiddler
Firewalls
Placement of Sensors
Summary
CHAPTER 3. Other Network Evidence
Overview of Botnets and Other Network-Aware Malware
The Botnet Life Cycle
Temporal, Relational, and Functional Analyses and Victimology
First Responder Evidence
Sources of Network-Related Evidence
Dynamic Evidence Capture
Malware Analysis: Using Sandbox Technology
Summary
PART III ANALYZING EVIDENCE WITH OPEN SOURCE SOFTWARE
CHAPTER 4. Deciphering a TCP Header
OSI and TCP Reference Models
TCP Header
Source Port Number
Destination Port Number
Sequence Number
Acknowledgment Number
Data Offset
Reserved
TCP Flags
Windows Size
TCP Checksum
Urgent Pointer
TCP Options
Padding
Decipherment of a TCP Segment
TCP Signature Analysis
Summary
CHAPTER 5. Using Snort for Network-Based Forensics
IDS Overview
Snort Architecture
Real-Time Network Traffic Capturing
Playback Binary Network Traffic (pcap Format)
Snort Preprocessor Component
Snort Detection Engine Component
Network Forensics Evidence Generated with Snort
Summary
PART IV COMMERCIAL NETWORK FORENSICS APPLICATIONS
CHAPTER 6. Commercial NetFlow Applications
What Is NetFlow?
How Does NetFlow Work?
The Benefit of NetFlow
NetFlow Collection
NetFlow User Datagram Protocol (UDP) Datagrams
NetFlow Header
Enabling NetFlow
Enabling NetFlow v9 (Ingress and Egress)
What Is an FNF?
Key Advantages
Enabling FNF
What Is an sFlow?
Enabling sFlow
Which Is Better: NetFlow or sFlow?
Scrutinizer
Scaling
Scrutinizer Forensics Using Flow Analytics
Using Flow Analytics to Identify Threats within NetFlow
Summary
CHAPTER 7. NetWitness Investigator
Introduction
NetWitness Investigator Architecture
Import/Live Capture Network Traffic
Collections
Parsers, Feeds, and Rules
Navigation Views
Data Analysis
Exporting Captured Data
Summary
CHAPTER 8. SilentRunner by AccessData
History of SilentRunner
Parts of the SilentRunner System
Installing SilentRunner
Stand-Alone Installation
Distributed Installation
SilentRunner Terminology
Graphs
Spec Files
Customizing the Analyzer
Context Management
Data Investigator Tools
Some Final Tricks and Tips
Summary
References
PART V MAKING YOUR NETWORK FORENSICS CASE
CHAPTER 9. Incorporating Network Forensics into Incident Response Plans
Investigation Method
Incident Response
Spearphishing
DMCA Violations
Web Site Compromise: Search Engine Spam and Phishing
Summary
References
CHAPTER 10. Legal Implications and Considerations
Internet Forensics
Admissibility of Internet Evidence
Hearsay Exceptions and Internet Evidence
Cloud Forensics
Evidence Collection in the Cloud
Admissibility of Cloud Evidence
E-Discovery in the Cloud
International Complexities of Internet and Cloud Forensics
The Hague Convention on Evidence
Privacy
Summary
References
Case Law
Legislation
CHAPTER 11. Putting It All Together
Network Forensics Examiner Skills
Network Forensics Investigation Life Cycle
Summary
PART VI THE FUTURE OF NETWORK FORENSICS
CHAPTER 12. The Future of Cloud Computing
History of Cloud Computing
What Drives the Cloud
A Break from Dependence on IT to Solve a Business Problem
The Cloud Is Enabled through Virtualization
Accelerating Development and Delivery of New Applications
Private versus Public Cloud Computing
Which Cloud Vendors Will Rise to the Top?
Yes, There Are Risks
The Risks Are Worthwhile
Will Microsoft and Google Be the 1000-Pound Gorillas of the Cloud?
The Current State of Cloud Computing
Cloud Usage Patterns
Who Will Host the Cloud?
Cloud Computing and Collective Intelligence
Security and IT from the Cloud
Other Widely Used Cloud Applications
Cloud Market Size
Elements of the Cloud
The U.S. Federal Government Is Leading the Movement to the Cloud
Rapid Rate of Change
Common Security Risks of the Current Cloud
Next Phases of Cloud Computing
New Database Models Will Greatly Change Product Creation
Integrated Applications Will Accelerate Cloud Product Creation
Microsoft Azure Will Enable a Cloud Cottage Industry
Other Changes in the New Cloud World
Security Improvements in the Future Cloud
Summary
CHAPTER 13. The Future of Network Forensics
Today’s Challenges with Existing Devices for Network Forensics
Network Forensics Quadrants of Focus
Network Forensics Analysis Tools
People also search for Digital Forensics for Network Internet and Cloud Computing A Forensic Evidence Guide for Moving Targets and Data 1st:
digital forensics for network internet and cloud computing
what is data communication in computer network
digital forensics cloud computing
digital forensic tools for cloud computing
digital forensics in the cloud
Tags:
Terrence V Lillard,Network Internet,Cloud Computing,Moving Targets,Data