Investigating Data Hiding and Covert Communication
(Sprache: Englisch)
The book will focus on incident response methods and techniques when faced with the unprecedented challenge that data hiding and covert communication pose. All three states of data hiding and covert communication will be considered. When data is at rest...
Leider schon ausverkauft
versandkostenfrei
Buch
43.00 €
Produktdetails
Produktinformationen zu „Investigating Data Hiding and Covert Communication “
Klappentext zu „Investigating Data Hiding and Covert Communication “
The book will focus on incident response methods and techniques when faced with the unprecedented challenge that data hiding and covert communication pose. All three states of data hiding and covert communication will be considered. When data is at rest (Desktop and Mobile Devices) When data is in motion (overtly and covertly communicated) When data is in use (on any computing platform) This book is for practitioners, forensic investigators, educators, students, private investigators, or anyone advancing digital forensics for investigating cybercrime. Additionally, the book will include open source examples and tools that will aid investigators and incident response personnel in dealing with this threat. Investigating Data Hiding and Covert Communications will be the first book to directly focus on one of the most daunting challenges that investigators and incident respond personnel face today.
Inhaltsverzeichnis zu „Investigating Data Hiding and Covert Communication “
Chapter 1: What is Data Hiding and Covert Communication (50 Pages)History and overview of data hiding, encryption and steganography.
How is data hiding being used to cover incriminating data?
What is covert communications and what are the current and future impacts?
How are criminals using encryption and steganography to covertly communicate?
How are criminals using encryption as the key weapon in Ransomware crimes?
Chapter summary
Chapter 2: Investigating Hidden Data at Rest (70 Pages)
Legal challenges and considerations
Key challenges when encrypted data is at rest
Identifying encrypted files, not as easy as you might think
Assessing the encrypted content for weaknesses
Methodologies and tools for attacking and deciphering encrypted content
Discovering evidence of steganography use
Identifying files that contain steganographic content
Identifying weaknesses in differing steganography approaches
Methodologies and tools for attacking and recovering data from stego'd images
Chapter Summary
Chapter 3: Investigating Data in Motion and Covert Communications (80 Pages)
Common operational models for exchanging secret content
Discovering weak links in secret message exchange
Discovering who and when secret message exchange is occurring
Identifying potential weaknesses in the communication exchange
Methodologies and tools for attacking and deciphering encrypted messages
What is covert communications and covert channels
How to identify covert channel usage
How to jam or disrupt covert channels
How to intercept and tag covert channel communications
Chapter Summary
Chapter 4: Investigating Hidden Data during Use (50 Pages)
When data hiding is most vulnerable and most dangerous
How can we gain access to the data when most vulnerable?
How can we use this data to prevent or disrupt criminal activity?
Methodologies and tools that attack hidden data while in use
Chapter
... mehr
summary
Chapter 5: The Investigators Data Hiding Toolkit (50 Pages)
Open Source Tool Summary
Putting the Open Source Tools to work
Case studies and examples
Chapter summary
Chapter 6: Future Considerations (15 Pages)
What are the obvious next steps? (Evolutionary)
What are the not so obvious next steps? (Revolutionary)
Closing Remarks
Chapter 5: The Investigators Data Hiding Toolkit (50 Pages)
Open Source Tool Summary
Putting the Open Source Tools to work
Case studies and examples
Chapter summary
Chapter 6: Future Considerations (15 Pages)
What are the obvious next steps? (Evolutionary)
What are the not so obvious next steps? (Revolutionary)
Closing Remarks
... weniger
Autoren-Porträt
Chet Hosmer, Founder of Python Forensics Inc., Co-founder and former CEO/Chief Scientist of WetStone Technologies, Inc., USA
Bibliographische Angaben
- 2019, 300 Seiten, mit Abbildungen, Maße: 17 x 24 cm, Kartoniert (TB), Englisch
- Verlag: De Gruyter
- ISBN-10: 1501515217
- ISBN-13: 9781501515217
- Erscheinungsdatum: 01.09.2019
Sprache:
Englisch
Kommentar zu "Investigating Data Hiding and Covert Communication"
0 Gebrauchte Artikel zu „Investigating Data Hiding and Covert Communication“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Investigating Data Hiding and Covert Communication".
Kommentar verfassen