Book Review: Digital Crime and Forensic Science in Cyberspace

Similar documents
Book Review: Challenges to Digital Forensic Evidence

The Psychology of Stalking Definitions p. 2 Incidence and Prevalence of Stalking p. 3 This Book p. 3 Current Findings p. 4 New and Controversial

2016 Webinar Series: NCL in the Classroom

NYU Scholars for Department Coordinators:

THE PSYCHOLOGY STALKIN0

INTERNATIONAL STANDARD

Simple Steps to Effective Library Research :

The Literature Resource Center User Guide

NYU Scholars for Individual & Proxy Users:

Open to All? The Public Library and Social Exclusion Volume 3: Working Papers

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Measuring the reach of your publications using Scopus

Latinos of Boulder County, Colorado,

Metal Theft Taskforce Identification Booklet

Performance Evaluation of Stream Ciphers on Large Databases

CRIS with in-text citations as interactive entities. Sergey Parinov CEMI RAS and RANEPA

Publishing research. Antoni Martínez Ballesté PID_

SHEPARD S CITATIONS. How to. Shepardize. Your guide to legal research using. Shepard s. Citations: in print. It s how you know

Secrecy in Limbo: What the Most Recent Settlement with the IRS Means for UBS and the Rest of the Swiss Banking Industry

What You Need to Know About Addressing GDPR Data Subject Rights in Primo

Book Review: Treatise of International Criminal Law, Vol. i: Foundations and General Part, Oxford University Press, Oxford, 2013, written by Kai Ambos

adfh Digital Crime and Digital Terrorism

General Terms and Conditions relating to the My Kinepolis account (15/05/2018)

2018 GUIDE Support for cinemas

IOT TECHNOLOGY AND ITS IMPACT

IoT Evidence Acquisition Issues and Challenges

Recognizing Stalking in Intimate Partner Cases. Part I: Recognizing Stalking in Intimate Partner Violence Cases 8/8/2017

DON T SPECULATE. VALIDATE. A new standard of journal citation impact.

Suggested Publication Categories for a Research Publications Database. Introduction

Running a Journal.... the right one

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

ICOMOS Charter for the Interpretation and Presentation of Cultural Heritage Sites

ITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things

GUIDELINES FOR PREPARATION OF ARTICLE STYLE THESIS AND DISSERTATION

Bibliometric glossary

Stalking ~~~~~ Presented by: Heather Putnam Danyel Albert

Image Steganalysis: Challenges

Bulletin Board Packet Stalking is No Joke!

Update to 8 June 2011 Press Release

GLOSSARY of Internet and Library Terms

PROCEEDINGS OF SPIE. Event: SPIE Defense, Security, and Sensing, 2013, Baltimore, Maryland, United States

First Stage of an Automated Content-Based Citation Analysis Study: Detection of Citation Sentences 1

How to be an effective reviewer

Device Management Requirements

COMM 450 Telecommunications Law

Synergy SIS Attendance Administrator Guide

ISO Digital Forensics- Video Analysis

Course Projection - subject to change and error; consult catalog and course schedule to confirm details

NUMB3RS Activity: Coded Messages. Episode: The Mole

CITATION INDEX AND ANALYSIS DATABASES

Digital Library Literature: A Scientometric Analysis

Pseudorandom bit Generators for Secure Broadcasting Systems

CUBITT TOWN JUNIOR SCHOOL CCTV POLICY 2017

Saved from url= Databases

@UERA Summer School 2016

THESIS GUIDE Preparing a Thesis or Dissertation

Researching Islamic Law Topics Using Secondary Sources

Sixth Edition Accounting 1 Syme Ireland Answer

THE MARRIAGE OF CADMUS AND HARMONY BY ROBERTO CALASSO DOWNLOAD EBOOK : THE MARRIAGE OF CADMUS AND HARMONY BY ROBERTO CALASSO PDF

Course Projection subject to change and error; consult catalog and course schedule to confirm details. Program Advisor

Building Your DLP Strategy & Process. Whitepaper

Overview of the Texas Administrative Code. Administrative Policy Writing Spring 2011

WP6- Analysis in the Visual Domain

The Art Of Rhetoric (Penguin Classics) Books

Forensic Psychology. Jack Kitaeff. Click here if your download doesn"t start automatically

PUBLISHER FOR NEW AUTHORS. Information for. new Authors

Bibliometric Study on LIS Journals Archived in DOAJ

Electronic display devices Part 2-3: Measurements of optical properties Multi-colour test patterns ICS ; ISBN

Court Filings 2000 Trial

Approaching Aesthetics on User Interface and Interaction Design

ITU-T Y Functional framework and capabilities of the Internet of things

Art and Education Manuscripts, circa AED

Library Media Services. Finding, Using & Downloading e-books. Contents. version Contact:

New Jersey Department of Education

Recent advances in technology with cloud computing and big data have brought major. In their book Privacy in the Age of Big Data: Recognizing Threats,

Quality Of Manuscripts and Editorial Process

Predicting the Importance of Current Papers

LFSR stream cipher RC4. Stream cipher. Stream Cipher

WATERMARKING USING DECIMAL SEQUENCES. Navneet Mandhani and Subhash Kak

CYRIL JACKSON PRIMARY SCHOOL CCTV POLICY

1.1 What is CiteScore? Why don t you include articles-in-press in CiteScore? Why don t you include abstracts in CiteScore?

LEGAL BIBLIOGRAPHY OF THE BRITISH COMMONWEALTH OF NATIONS

Cold Harbor to the Crater: The End of the Overland Campaign

Institute for Policy and Economic Development. Publication and Technical Report Specifications with Grant Proposal Writing and Report Editing Timeline

THEORIES OF PERSONALITY 10TH EDITION PDF

Sir George Lee ( ) Papers

Citation Analysis. Presented by: Rama R Ramakrishnan Librarian (Instructional Services) Engineering Librarian (Aerospace & Mechanical)

2017 GUIDE. Support for theatres

The Paralegal: Second Edition By Daniel Easterling READ ONLINE

THEORY AND APPLICATIONS OF SPECIAL FUNCTIONS. A Volume Dedicated to Mizan Rahman

G4S ACADEMY BODYCAMS GUIDE VERSION

Using Bibliometric Analyses for Evaluating Leading Journals and Top Researchers in SoTL

Activity 1A: The Power of Sound

Stalking and Sexual Violence Stalking Context Context is critical!

Metal Theft Taskforce Identification Booklet. Version 2

What is Steganography

THE USE OF THOMSON REUTERS RESEARCH ANALYTIC RESOURCES IN ACADEMIC PERFORMANCE EVALUATION DR. EVANGELIA A.E.C. LIPITAKIS SEPTEMBER 2014

Introduction. The report is broken down into four main sections:

Privacy Policy. April 2018

(web semantic) rdt describers, bibliometric lists can be constructed that distinguish, for example, between positive and negative citations.

Transcription:

Publications 2006 Book Review: Digital Crime and Forensic Science in Cyberspace Gary C. Kessler Champlain College - Burlington, kessleg1@erau.edu Follow this and additional works at: https://commons.erau.edu/publication Part of the Computer Law Commons Scholarly Commons Citation Kessler, G. C. (2006). Book Review: Digital Crime and Forensic Science in Cyberspace. Journal of Digital Forensics, Security and Law, 1(4). Retrieved from https://commons.erau.edu/publication/130 This Book Review is brought to you for free and open access by Scholarly Commons. It has been accepted for inclusion in Publications by an authorized administrator of Scholarly Commons. For more information, please contact commons@erau.edu.

BOOK REVIEWS Gary C. Kessler Editor Champlain College Burlington, VT 05401 gary.kessler@champlain.edu INTRODUCTION This issue presents the first Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net). BOOK REVIEW Kanellis, P., Kiountouzis, E., Kolokotronis, N., & Martakos, D. (2006). Digital Crime and Forensic Science in Cyberspace. Hershey, PA: Idea Group Publishing, 357 pages, ISBN: 1-59140-873-3 (paper), US$79.95. Reviewed by Gary C. Kessler This book, according to the preface, "is intended for those who are interested in a critical overview of what forensic science is, care about privacy issues, and wish to know what constitutes evidence for computer crime." It goes on to say that the specific audiences for which it was written are students in academia and professionals in the industry. If used carefully, this book does a good job at providing a snapshot of some of the current issues in digital forensics, although perhaps best aimed at information security professionals. It is a collection of 15 chapters written by authors from Greece, Italy, The Netherlands, South Africa, the U.K., and the U.S. The international flavor of the writing is also welcome in the field. The book is divided into four parts. Section I (53 pages) is titled Cyberspace and Digital Forensics. The two chapters in this section describe network attacks on computers and malware. While these chapters offer a good overview of these topics, neither provides a context for computer forensics, per se, although they are an excellent introduction for information security students and professionals. There is nothing here about computer investigations nor attacks on people, such as cyberstalking, privacy, child sexual exploitation, or any of the other problems commonly seen by computer forensics investigators. 67

Section II (162 pages) is titled Computer and Network Forensics. Comprising seven chapters, this section makes up nearly half of the book. The very first chapter offers a nice overview of both computer and network forensics processes and tools. The next two chapters also address tools; one provides a glimpse into next-generation forensics tools and the other discusses the allimportant topic of tool validation techniques. These are followed by a chapter on network log analysis and correlation of logs to actual events. The following two chapters address works-in-progress, one on the use of a network-based forensic profiling system for real-time evidence gathering and the other on the use of data mining in criminal investigations. The section wraps up with the longest chapter in the book and one of the better descriptions of steganography and steganalysis that this reviewer has read. Section III (50 pages) is titled Incident Response and comprises two chapters. The first chapter is devoted to issues surrounding the creation of security policies aimed at preparedness and response to information security incidents. The second chapter describes the relationship between digital forensics and corporate, information technology, and information security governance. This section, however, does not really discuss any specifics about incident response methods, tools, and processes. Finally, Section IV (73 pages) is titled Cyber Investigation and Training. The first chapter addresses some of the legal issues related to wide-scale digital investigations that cross international boundaries, particularly with respect to EU countries. The second chapter addresses issues related to the design of digital forensics academic curricula. The next chapter ostensibly discusses computer forensics training, although it does a better job on general information security training (why do so many authors mention the CISSP in the context of computer forensics?) and some computer forensics productspecific training; it doesn't actually mention any of the computer forensics training certifications that can be obtained. The fourth chapter in this section, and the last of the book, is by M. Caloyannides and titled "Digital 'Evidence' is Often Evidence of Nothing." This is an interesting chapter to be in a book like this since Caloyannides has often made the case about the unreliability of digital evidence. While information found on computers does, indeed, need to be interpreted within the larger context of an investigation and a pattern of behavior, this reviewer disagrees that it is as weak as Caloyannides suggests. Nevertheless, hearing from a naysayer is probably a good thing for the reader, as the editors of this volume suggest in the book's foreword. The writing in this book is of generally high-quality although the titles of some of the chapters are a bit misleading, as mentioned in several places above. The writing has value but my expectations were different than the reality because of the labeling. 68

While the book provides a snapshot of some aspects of information security and digital forensics, it is far from complete. There is, for example, no mention in the book of cryptography, whole disk encryption, or encrypting operating systems (e.g., Vista) and the impact on computer forensics. There is no mention of forensics on cell phones or other mobile devices, and this is undoubtedly a big part of the future of digital investigations. All-in-all I liked this book and think that it makes a contribution to the literature. As a compendium, it belongs on the bookshelf next to the proceedings of the Digital Forensics Research Workshop (DFRWS) and IFIP 11.9 International Conference on Digital Forensics. But information security professionals are probably the better audience than digital forensics investigators. 69

70