CHFI [4 of 5] Computer Forensics: Investigating Network Intrusions & Cyber Crime

Network Intrusions and Cybercrime includes a discussion of tools used in investigations as well as information on investigating network traffic, Web attacks, DOS attacks, corporate espionage, and much more!

Chapter 1, Network Forensics and Investigating Logs, discusses how to look for evidence, the different logs used in investigating, and a discussion of NTP. 

Chapter 2, Investigating Network Traffic, explains basic networking concepts, the ways that an intruder can attack a network, and how an investigator gathers evidence and what tools can be used. 

Chapter 3, Investigating Web Attacks, covers how to recognize and investigate attacks, what tools attackers use, and how to proactively defend against attacks. 

Chapter 4, Router Forensics, discusses router architecture, the different types of router attackers and how to investigate them, and introduces various router auditing tools. 

Chapter 5, Investigating DoS Attacks, provides an understanding of DoS attacks, how to recognize the indication of DoS/DDoS attacks, and how to investigate these attacks. 

Chapter 6, Investigating Internet Crime, describes the different forensic methods and tools investigators use when investigating Internet crimes. 

Chapter 7, Tracking E-Mails and Investigating E-Mail Crime, focuses on the different parts of an e-mail system and the different kinds of e-mail crimes. 

Chapter 8, Investigating Corporate Espionage, discusses the different aspects of corporate espionage and strategies to prevent and investigate such cases. 

Chapter 9, Investigating Trademark and Copyright Infringement, explains what constitutes infringement and how that infringement can be investigated. 

Chapter 10, Investigating Sexual Harassment Incidents, explains sexual harassment, how to investigate and prevent it, and includes laws concerning sexual harassment. 

Chapter 11, Investigating Child Pornography, defines child pornography and discusses the role of the Internet in promoting child pornography. This chapter also enumerates the steps for investigating child pornography cases as well as a discussion on child pornography laws.