NCJ Number
174742
Date Published
1998
Length
196 pages
Annotation
This book emphasizes traditional investigative skills as the keystone to solving computer crimes and offers training in fundamental investigative methods such as observation and logic, and covers topics as diverse as solvability factors, retail computer security, crimes associated with the Internet, and intelligence gathering techniques.
Abstract
Designed for security managers and investigators, the book moves through the basic phases of a computer crime investigation. It starts with establishing evidence of a crime and then moves on to determining how the crime occurred, identifying likely suspects, developing the case for prosecution, proving damages, and assessing perpetrators as targets for civil litigation. The book specifically covers investigative measures, information security, and fraud on the Internet, as well as preserving evidence from attacks on computer hardware and environmental support systems and computer hardware. Countermeasures security managers can implement to deal with computer crime are described. An appendix contains further information on information warfare and computer security. References, tables, and figures