Training the Cyber Investigator

Training the Cyber Investigator

Christopher Malinowski (Long Island University, USA)
Copyright: © 2006 |Pages: 23
DOI: 10.4018/978-1-59140-872-7.ch014
OnDemand PDF Download:


This chapter considers and presents training possibilities for computer forensic investigators. The author differentiates between civil service and industry needs for training, as well as cites differences in considerations for providing such training. While each organization has its own requirements, different paradigms and forums for training are offered allowing the reader to develop a training plan which may be unique to his/her organization. Those common subject matter areas which are felt critical to all organizations and needs are identified as well, providing a “core” knowledge and skill base around which to plan a training strategy.

Complete Chapter List

Search this Book:
Table of Contents
Kyriakos Tsiflakos
Panagiotis Kanellis, Evangelos Kiountouzis, Nicholas Kolokotronis, Drakoulis Martakos
Panagiotis Kanellis, Evangelos Kiountouzis, Nicholas Kolokotronis, Drakoulis Martakos
Chapter 1
Thomas M. Chen, Chris Davis
This chapter gives an overview of the major types of electronic attacks encountered today and likely to continue into the foreseeable future. A... Sample PDF
An Overview of Electronic Attacks
Chapter 2
Steven Furnell, Jeremy Ward
In the two decades since its first significant appearance, malware has become the most prominent and costly threat to modern IT systems. This... Sample PDF
Malware: An Evolving Threat
Chapter 3
Sriranjani Sitaraman, Subbarayan Venkatesan
This chapter introduces computer and network forensics. The world of forensics is well understood in the non-digital world, whereas this is a... Sample PDF
Computer and Network Forensics
Chapter 4
III Richard, Vassil Roussev
Digital forensics investigators have access to a wide variety of tools, both commercial and open source, which assist in the preservation and... Sample PDF
Digital Forensic Tools: The Next Generation
Chapter 5
Philip Craiger, Jeff Swauger, Chris Marberry, Connie Hendricks
An important result of the U.S. Supreme Courts Daubert decision is that the digital forensic tools must be validated if the results of examinations... Sample PDF
Validation of Digital Forensic Tools
Chapter 6
Dario Valentino Forete
Log file correlation comprises two components: Intrusion Detection and Network Forensics. The skillful and mutualistic combination of these distinct... Sample PDF
Log Correlation: Tools and Techniques
Chapter 7
Pallavi Kahai, Kamesh Namuduri, Ravi Pense
Security incidents that threaten the normal functioning of the organization are on the rise. In order to resist network attacks most organizations... Sample PDF
Tracing Cyber Crimes with a Privacy-Enabled Forensic Profiling System
Chapter 8
Caroline Chibelushi, Bernadette Sharp, Hanifa Shah
The advancement of multimedia and communication systems has not only provided faster and better communication facilities but also facilitated easier... Sample PDF
ASKARI: A Crime Text Mining Approach
Chapter 9
Sos S. Agaian, Benjamin M. Rodriguez
This chapter focuses on the development of digital forensic steganalysis tools/methods through analysis and evaluation of the most popular “sample... Sample PDF
Baseic Steganalysis for the Digital Media Forensics Examiner
Chapter 10
Warren Wylupski, David R. Champion, Zachary Grant
One of the emerging issues in the field of digital crime and digital forensics is corporate preparedness in dealing with attacks on computer network... Sample PDF
Incident Preparedness and Response: Devlopming a Security Policy
Chapter 11
S.H. (Basie) von Solms, C.P. (Buks) Louwrens
The purpose of this chapter is twofold: Firstly, we want to determine the relationships, if any, between the discipline of digital forensics and the... Sample PDF
The Relationship Between Digital Forensics, Corporate Governance, IT Governance, and IS Governance
Chapter 12
Andreas Mitrakas, Damián Zaitch
The steep increase of cyber crime has rendered digital forensics an area of paramount importance to keep cyber threats in check and invoke legal... Sample PDF
Law, CyberCrime and Digital Forensics: Trailing Digital Suspects
Chapter 13
Bernd Carsten Stahl, Moira Carroll-Mayer, Peter Norris
In order to be able to address issues of digital crime and forensic science in cyberspace, there is a need for specifically skilled individuals.... Sample PDF
Forensic Computing: The Problem of Developing a Multidisciplinary University Course
Chapter 14
Christopher Malinowski
This chapter considers and presents training possibilities for computer forensic investigators. The author differentiates between civil service and... Sample PDF
Training the Cyber Investigator
Chapter 15
Michael A. Caloyannides
Digital data increasingly presented in courts as evidence is mistakenly viewed by judges and juries as inherently unalterable. In fact, digital data... Sample PDF
Digital "Evidence" is Often Evidence of Nothing
About the Authors