Cybercrime Investigators Handbook
By Graeme Edwards, Ph.D., CFE
This book’s author is a CFE

Description
Cyber attacks perpetrated against businesses, governments, organizations and individuals have been occurring for decades. Many attacks are discovered only after the data has been exploited or sold on the criminal markets. Cyber attacks damage both the finances and reputations of businesses and cause damage to the ultimate victims of the crime. From the perspective of the criminal, the current state of inconsistent security policies and lax investigative procedures is a profitable and low-risk opportunity for cyber attacks. Criminals can cause immense harm to individuals or businesses online and make large sums of money knowing that victims rarely report the matter to the police.
The "Cybercrime Investigators Handbook" is an innovative guide that approaches cybercrime investigation from the field-practitioner’s perspective. In this book, you will learn how to commence an investigation from the location the crime occurred and collect the evidence necessary to locate and prosecute the offender. Additionally, you will learn how to locate, lawfully seize, preserve, examine, interpret and manage the technical evidence that is vital for effective cybercrime investigation.
This Book Provides:
- Practical cybercrime guidance with clear, easy-to-understand language
- Guidance to help your company comply with GDPR guidelines
- Expert advice from a law enforcement professional who specializes in cybercrime investigation and IT security
Product Details
Label | Value |
---|---|
ISBN | 978-1119596288 |
Publisher | Wiley; 1st Edition (September 18, 2019) |
Published | Copyright 2019 |
Pages | 320 |
Format | Hardcover |
Table of Contents
Chapter 1 | Introduction |
---|---|
Chapter 2 | Cybercrime Offenses |
Chapter 3 | Motivations of the Attacker |
Chapter 4 | Determining That a Cybercrime is Being Committed |
Chapter 5 | Commencing a Cybercrime Investigation |
Chapter 6 | Legal Considerations When Planning an Investigation |
Chapter 7 | Initial Meeting with the Complainant |
Chapter 8 | Containing and Remediating the Cyber Security Incident |
Chapter 9 | Challenges in Cyber Security Incident Investigations |
Chapter 10 | Investigating the Cybercrime Scene |
Chapter 11 | Log File Identification, Preservation, Collection, and Acquisition |
Chapter 12 | Identifying, Seizing, and Preserving Evidence from Cloud-Computing Platforms |
Chapter 13 | Identifying, Seizing, and Preserving Evidence from Internet of Things Devices |
Chapter 14 | Open Source Evidence |
Chapter 15 | The Dark Web |
Chapter 16 | Interviewing Witnesses and Suspects |
Chapter 17 | Review of Evidence |
Chapter 18 | Producing Evidence for Court |
Chapter 19 | Conclusion |
Ordering and Returns
Satisfaction Guarantee
If you are not 100% satisfied with any ACFE product, you may return it to us, provided it is in excellent condition, for a full refund of the item minus the cost of shipping. Toolkits and bundles may only be returned as a complete set.
Ordering & Returns Policy