CHFI [1 of 5] Computer Forensics: Evidence Collection & Preservation

The first book in the Computer Forensics series is Investigation Procedures and Response. Coverage includes a basic understanding of the importance of computer forensics, how to set up a secure lab, the process for forensic investigation including first responder responsibilities, how to handle various incidents and information on the various reports used by computer forensic investigators.

Chapter 1, Computer Forensics in Today’s World, discusses some of the most important problems and concerns forensic investigators face today including objectives and methodologies used in computer forensics.

Chapter 2, Computer Forensic Lab, describes the physical security needs of a lab and recommends how to maintain security.

Chapter 3, Computer Investigation Process, introduces the concept of computer investigation and shows the steps involved in investigating computer crime.

Chapter 4, First Responder Procedures, explains the role of the first responder, how to build a first responder tool-kit and how to avoid some common mistakes often made by first responders.

Chapter 5, Incident Handling, discusses how to react to various incidents including system crashes, packet flooding, and unauthorized use of another user’s account.

Chapter 6, Investigative Reports, focuses on different investigative reports and how to make sure the report is well-written for use in possible legal matters.

TABLE OF CONTENTS

PREFACE

CHAPTER 1
Computer Forensics in Today’s World

CHAPTER 2
Computer Forensics Lab

CHAPTER 3
Computer Investigation Process

CHAPTER 4
First Responder Procedures

CHAPTER 5
Incident Handling

CHAPTER 6
Investigative Report

INDEX