Note: Page numbers followed by “f” indicate figures, “t” indicate tables and “b” indicate boxes.
Abstract model of digital forensic procedures,
161, 161fAccessData Certified Examiner (ACE),
178AccessData Mobile Phone Examiner (AME),
178Administrative controls,
88Administrative governance foundations,
99incident/investigation response,
101Advanced Computer Forensic Workshop (ACFW),
179Advanced Internet Child Exploitation (AICE),
179Advanced persistent threats (APTs),
3Advanced Specialty Certificate (ASC),
179Aligning requirements,
262American Academy of Forensic Sciences,
6American Society for Industrial Security (ASIS),
177specification-based detection,
110Annual rate of occurrence (ARO),
223–224Annualized loss expectancy (ALE),
224Application oriented,
256Arbitrary regulations,
59Associate of Applied Science (AAS),
185–186Association of Chief of Police Officers (ACPO),
37, 98Attack simulation, process for,
242Australian Signal Directorate (ASD),
107bBachelor of Science (BS),
185Bachelor of Technology (BTech),
179Backup and restoration strategies,
102data restoration
from off-line backup media,
103from online backup media,
103near real-time data replication,
103Benefit/Cost Ratio (BCR),
210, 210tBusiness
Business learning, technical learning
vs.,
135–136forensic readiness scenarios,
55demonstrating compliance with regulatory or legal requirements,
59effectively managing release of court ordered data,
59–60producing evidence to support organizational disciplinary issues,
58reducing cybercrime impact,
55–56supporting contractual and/or commercial agreements,
60validating impact of cybercrime or disputes,
56–58threat category to security property relationship,
56tCanadian Internet Child Exploitation (CICEC),
179Categorizing requirements,
262Cell Phone Seizure and Analysis (CSAC),
179Certified Advanced Windows Forensic Examiner (CAWFE),
178Certified BlackLight Examiner (CBE),
178Certified Computer Crime Investigator (CCCI),
177Certified Computer Examiner (CCE),
178Certified Computer Forensic Technician (CCFT),
177Certified Computer Forensics Examiner (CCFE),
178Certified Forensic Computer Examiner (CFCE),
178Certified Information Forensics Investigator (CIFI),
178Chain-of-evidence model,
79fClosed caption television (CCTV),
91Cloud service providers (CSP),
64, 70Collection of evidence,
37–38Collection requirements,
73data security requirements,
81–82evidence collection factors,
75correlation and association,
78corroboration and redundancy,
79storage infrastructure,
80–81precollection questions,
73–75Commercial-off-the-shelf (COTS),
255Common body of knowledge (CBK),
5Common process model for incident and computer forensics,
169–170, 169f
Comparative analysis,
174baseline-future scenario gap analysis,
213finternal rate of return,
211Net present value of net benefits,
210sensitivity analysis,
212Compliance with regulatory or legal requirements,
59Computer (security) incident response team (CIRT/CSIRT),
46Computer Forensic Examiner (CMPFOR),
179field triage process model,
167, 167fComputer Hacking Forensic Investigator (CHFI),
177Computer Information Systems (CIS),
185Computer Information Technology (CIT),
185Confidentiality, integrity, and availability triad (CIA triad),
23Configuration/log files,
11Continuing education establishment
balancing business
vs. technical learning,
135–136education and training,
129Control logs mitigation,
56–57Correlation and association,
78Corroboration and redundancy,
79Cost–benefit analysis (CBA),
73, 203Crime prevention through environmental design (CPTED),
92Cryptographic algorithms,
90Cybercrime impact
indirect business loss,
57mitigating control logs,
56–57overhead time and effort,
57recovery and continuity expenses,
57–58Cyclic Redundancy Check,
90Data
restoration
from off-line backup media,
103from online backup media,
103data exposure concerns,
70–71external data considerations,
70forensics in system development life cycle,
71implementation factors,
254value and expectation,
254online transaction and analytical processing
Defense-in-depth strategy,
107insufficient data availability,
67–69unidentified data sources,
70Digital forensic certifications,
177industry neutral certifications,
177–178vendor-specific certifications,
178Digital forensic education,
178–189United Arab Emirates,
184Digital forensic investigation(s),
46Digital forensic process models,
17, 18t, 158tDigital forensic readiness,
151digital forensic investigations,
151do not reinventing wheel,
152maintaining business-centric focus,
151–152understanding costs and benefits,
152Digital forensic team,
30education and certification,
32roles and responsibilities,
30–32collecting digital evidence,
10order of volatility,
12, 13tforensic investigation types,
13–14model based on Malaysian investigation process,
170–171, 171freactive activities,
46–47Digital Technologies for Investigators (DTIC),
179Dual data analysis process,
170, 170fEffectively managing release of court ordered data,
59–60Electronic discovery (e-discovery),
14, 132Enable targeted monitoring
digital forensic readiness program,
105modern security monitoring,
107–108Next-Gen security controls layers,
108ftraditional security
Encase Certified Examiner (EnCE),
178Encrypted file system (EFS),
89, 97End-to-end
Enhanced integrated digital investigation process,
164–165, 164fEnterprise data warehouse (EDW),
76, 95, 247Entity relationship model,
256Escalation management,
119Event-based digital forensic investigation framework,
165–166, 166fcorrelation and association,
78corroboration and redundancy,
79storage infrastructure,
80–81Evidence management
operating procedures,
34–38digital forensic team,
30–32hardware and software,
33–34high-level digital forensic process model,
25finformation security management,
25–29, 26fEvidence-based reporting,
137exculpatory evidence,
141forensic viability of digital evidence,
137inculpatory evidence,
141written reports arrangement,
139–141Exculpatory evidence,
141Exposure Factor (EF),
223Extended model of cybercrime investigation,
163–164, 164fExternal data considerations,
70
External information sharing,
119Extraction, transformation, and loading (ETL),
250Federal Bureau of Investigation (FBI),
146bFederal Rules of Evidence,
37, 86File integrity monitoring (FIM),
113Florida Computer Crimes Act,
4Forensic Computing and Cybercrime Investigation (FCCI),
182scenarios for business risk,
55demonstrating compliance with regulatory or legal requirements,
59effectively managing release of court ordered data,
59–60producing evidence to support organizational disciplinary issues,
58reducing cybercrime impact,
55–56supporting contractual and/or commercial agreements,
60validating impact of cybercrime or disputes,
56–58Forensic Toolkit (FTK),
15Forensic(s)
in system development life cycle,
71Four-step forensic process,
166, 166fFunctional requirements,
261high-level digital forensic process model,
34foperating procedures,
34–35collection and preservation,
37–38identification of evidence,
35–37Generic computer forensic investigation model,
172–173Global Information Assurance Certification (GIAC),
178Global Information Assurance Certification Certified Forensic Analyst (GCFA),
178Global Information Assurance Certification Certified Forensic Examiner (GCFE),
178Global positioning system (GPS),
76Good conflict regulations,
59Good faith regulations,
59Good Practices Guide for Computer-Based Electronic Evidence,
37Governance
Greenwich Mean Time (GMT),
76Hardware for evidence management,
33–34Heuristical analysis,
109Hierarchical, objective-based framework for digital investigations process,
165, 165fHigh Tech Crime Network (HTCN),
177High Technology Crime Investigation (HTCI),
188Identification
search and seizure,
36–37Incident handling and response,
115eradication and recovery,
125order of volatility,
126tIncident management lifecycle,
113, 114fdigital forensic readiness model integration,
114high-level digital forensic process model,
114fincident response—forensic readiness integration,
115fIncident response team (IRT),
114, 117Inculpatory evidence,
141Indirect business loss,
57Industry best practices, references, methodologies, and techniques,
152Industry neutral certifications,
177–178Information assurance,
133Information Assurance Certification Review Board (IACRB),
178reactive activities,
46–47Information Security and Computer Forensics (ISCF),
180Information Security and Forensics (ISF),
187Insufficient data availability,
67Integrated digital investigation process,
161–162, 162fInternal rate of return,
211International Association of Computer Investigative Specialists (IACIS),
178International Information Systems Forensic Association (IISFA),
178International Information Systems Security Certification Consortium (ISC),
178International Society of Forensic Computer Examiners (ISFCE),
178Internet Evidence Analysis (IEAC),
179Interpersonal skills,
136Intrusion prevention systems (IPS),
107Investigation response,
101Investigative process models,
17, 157comparative analysis,
174computer forensic process model,
159, 159fdigital forensic readiness model,
21, 22fdigital forensic research workshop investigative model,
159–160, 160fabstract model of digital forensic procedures,
161, 161fcomputer forensic field triage process model,
167, 167fdigital forensic investigation, framework for,
166–167, 167fdigital forensic model based on Malaysian investigation process,
170–171, 171fdual data analysis process,
170, 170fenhanced integrated digital investigation process,
164–165, 164fevent-based digital forensic investigation framework,
165–166, 166fextended model of cybercrime investigation,
163–164, 164ffour-step forensic process,
166, 166fgeneric computer forensic investigation model,
172–173hierarchical, objective-based framework for digital investigations process,
165, 165fintegrated digital investigation process,
161–162, 162fnetwork forensics, generic framework for,
171–172, 172fprocess model for incident and computer forensics,
169–170, 169fscientific crime scene investigation model,
160–161, 160fsystematic digital forensic investigation model,
173–174broad audit process,
268ftargeted forensic process,
267fvolatile data process,
266f“Keep it cooperative” principle,
29, 102“Keep it dynamic” principle,
29, 102”Keep it practicable” principle,
29, 102“Keep it understandable” principle,
29, 102Least privilege access,
96digital forensic program,
85Federal Rules of Evidence,
86preservation challenges,
87preservation strategies,
87administrative controls,
88technical controls,
88–91Legal review
ensure legal resources,
143laws and regulations,
144obtaining legal advice,
146Live Analysis Workshop (LAW),
179Locard’s exchange principle,
8, 9fLogical investigative process,
265Macintosh and iOS Certified Forensic Examiner (MiCFE),
178Mapping investigative workflows
digital forensic readiness program,
113forensic investigations,
113incident handling and response,
115incident management lifecycle,
113, 114fdigital forensic readiness model integration,
114high-level digital forensic process model,
114fincident response—forensic readiness integration,
115finvestigation workflow,
127Market oriented data,
256Master of Science (MS),
184Master of Science in Computer Forensics and Security Management (MSCFSM),
188Master of Science in Cyber Law and Information Security (MSCLIS),
182Master of Science in Digital Forensics (MSDF),
188Master of Science in Information Security Technology and Management (MSISTM),
184Memory forensics,
14, 133Message Digest Algorithm family5 (MD5),
89–90Microsoft threat modeling,
241Modern security monitoring,
107–108National Institute of Standards and Technology (NIST),
90, 144Near real-time data replication,
103Net present value (NPV),
203Network
Network Investigative Techniques (NITC),
179Network time protocol (NTP),
76Next-generation (Next-Gen),
108security controls layers,
108fNondisclosure agreement (NDA),
193Online analytical processing (OLAP),
248Online transaction processing (OLTP),
247Open systems interconnection model (OSI model),
68Operational requirements,
261Overhead time and effort,
57Personal computer (PC),
4Postgraduate Certificate (PgC),
181Postgraduate Certificate in Computer Forensics (PCertCFR),
179Postgraduate Diploma (PgD),
181Postgraduate Diploma in Computer Forensics (PGDipCFR),
179Precollection questions,
73–75administrative controls,
88technical controls,
88–91prioritizing requirements,
263Privilege assignments,
96fabstract model of digital forensic procedures,
161, 161fcomputer forensic
field triage process model,
167, 167fdigital forensic investigation, framework for,
166–167, 167fdigital forensic model based on Malaysian investigation process,
170–171, 171fdigital forensic process models,
158tdigital forensic research workshop investigative model,
159–160, 160fdual data analysis process,
170, 170fenhanced integrated digital investigation process,
164–165, 164fevent-based digital forensic investigation framework,
165–166, 166fextended model of cybercrime investigation,
163–164, 164ffour-step forensic process,
166, 166fgeneric computer forensic investigation model,
172–173integrated digital investigation process,
161–162, 162fnetwork forensics, generic framework for,
171–172, 172fobjective-based framework for digital investigations process,
165, 165fprocess model for incident and computer forensics,
169–170, 169fscientific crime scene investigation model,
160–161, 160fsystematic digital forensic investigation model,
173–174
Professional certification,
132Professional Certified Investigator (PCI),
177Random access memory (RAM),
10Reactive activities,
46–47Records management staff,
216and continuity expenses,
57–58Recovery time objective (RTO),
102Registry Analysis Workshop (RAW),
179interpreting requirements,
262specification document,
263Requirements specification document,
327f–334fReturn on investment (ROI),
53, 199, 202advantages and disadvantages,
224methodologies, tools, and techniques,
224–225quantitative assessments,
223risk likelihood/severity heat map,
222fRisk life cycle workflow,
225, 226fRisk likelihood/severity heat map,
222fRochester Institute of Technology (RIT),
187Scientific crime scene investigation model,
160–161, 160fSearch of evidence,
36–37Secure Hashing Algorithm (SHA),
89–90Secure storage and handling establishment
administrative governance foundations,
99incident/investigation response,
101backup and restoration strategies,
102–103digital forensic readiness program,
95secure storage attributes,
95end-to-end cryptography,
97integrity checking,
97–98least privilege access,
96privilege assignments,
96f
Security incident response team (SIRT),
46Seizure of evidence,
36–37Sensitivity analysis,
212design considerations,
200operational service catalog hierarchy,
201fservice family/group/category,
200–201Service-level objectives (SLO),
70, 117, 202Signature-based technologies,
107Simple pattern matching,
109Single loss expectancy (SLE),
223Software for evidence management,
33–34Special Publication (SP),
90, 144Specification
specification-based detection,
110Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege (STRIDE),
239Standard operating procedures (SOP),
74, 117Stateful pattern matching,
109Statement of work (SOW),
193Storage
Structured threat information expression framework (STIX framework),
237, 238fSubject-oriented data,
247, 256Supporting contractual and/or commercial agreements,
60SysAdmin, Audit, Networking, and Security (SANS),
178System development life cycle, forensics in,
71Systematic digital forensic investigation model,
173–174Systems development life cycle (SDLC),
194, 259Tactics, techniques, and procedures (TTP),
122, 239building and implementation,
217conduct surveys and interviews,
218research and assessing,
215assessing existing data,
217business requirements and value proposition,
216–217establishing role within organization,
216cryptographic algorithms,
90integrity monitoring,
89–90Technical learning, business learning
vs.,
135–136Technical requirements,
262Technical writing skills,
136Technology
technology-generated data,
24, 86Temporary/cache files,
11–12The Pirate Bay (TPB),
145bThreat
category to security property relationship,
56trisk
Threat and risk assessment (TRA),
243–244business risk association,
240attack simulation, process for,
242Microsoft threat modeling,
241threat tree workflow,
240fTime value of money (TVM),
208Tool and equipment validation program,
191Total cost of ownership,
255Traditional security monitoring,
106–107Transitional requirements,
262Understandable reports,
139Unidentified data sources,
70United Arab Emirates,
184Universiteit van Amsterdam (UvA),
183University of Alabama at Birmingham (UAB),
188University of Cape Town (UCT),
183University of Nebraska Omaha (UNO),
188University of South Australia (UniSA),
179US Federal Rules of Civil Procedure,
138bUS Securities and Exchange Commission (SEC),
144b–145bUS Supreme Court Rules,
141Using Internet as an Intelligence Tool (INTINT),
179Vendor-specific certifications,
178Verbal formal reports,
138“Wall-and-fortress” approach,
151–152Wireless Networks Workshop (WNETW),
179Write once read many (WORM),
101Written formal reports,
139Written informal reports,
139Written reports arrangement,
139–141