Cybercrime Investigators Handbook

By Graeme Edwards, Ph.D., CFE

This book’s author is a CFE

Book cover for Cybercrime Investigators Handbook


Cyber attacks perpetrated against businesses, governments, organizations and individuals have been occurring for decades. Many attacks are discovered only after the data has been exploited or sold on the criminal markets. Cyber attacks damage both the finances and reputations of businesses and cause damage to the ultimate victims of the crime. From the perspective of the criminal, the current state of inconsistent security policies and lax investigative procedures is a profitable and low-risk opportunity for cyber attacks. Criminals can cause immense harm to individuals or businesses online and make large sums of money knowing that victims rarely report the matter to the police. 

The "Cybercrime Investigators Handbook" is an innovative guide that approaches cybercrime investigation from the field-practitioner’s perspective. In this book, you will learn how to commence an investigation from the location the crime occurred and collect the evidence necessary to locate and prosecute the offender. Additionally, you will learn how to locate, lawfully seize, preserve, examine, interpret and manage the technical evidence that is vital for effective cybercrime investigation.

This Book Provides:

  • Practical cybercrime guidance with clear, easy-to-understand language
  • Guidance to help your company comply with GDPR guidelines
  • Expert advice from a law enforcement professional who specializes in cybercrime investigation and IT security

Product Details

This book's author is a CFE.
Label Value
ISBN 978-1119596288
Publisher Wiley; 1st Edition (September 18, 2019)
Published Copyright 2019
Pages 320
Format Hardcover

Table of Contents

Chapter 1 Introduction
Chapter 2 Cybercrime Offenses
Chapter 3 Motivations of the Attacker
Chapter 4 Determining That a Cybercrime is Being Committed
Chapter 5 Commencing a Cybercrime Investigation
Chapter 6 Legal Considerations When Planning an Investigation
Chapter 7 Initial Meeting with the Complainant
Chapter 8 Containing and Remediating the Cyber Security Incident
Chapter 9 Challenges in Cyber Security Incident Investigations
Chapter 10 Investigating the Cybercrime Scene
Chapter 11 Log File Identification, Preservation, Collection, and Acquisition
Chapter 12 Identifying, Seizing, and Preserving Evidence from Cloud-Computing Platforms
Chapter 13 Identifying, Seizing, and Preserving Evidence from Internet of Things Devices
Chapter 14 Open Source Evidence
Chapter 15 The Dark Web
Chapter 16 Interviewing Witnesses and Suspects
Chapter 17 Review of Evidence
Chapter 18 Producing Evidence for Court
Chapter 19 Conclusion

Ordering and Returns

Satisfaction Guarantee

If you are not 100% satisfied with any ACFE product, you may return it to us, provided it is in excellent condition, for a full refund of the item minus the cost of shipping. Toolkits and bundles may only be returned as a complete set.

Ordering & Returns Policy