Contemporary digital forensic investigations of cloud and mobile applications

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date an...

Full description

Bibliographic Details
Other Authors: Choo, Kim-Kwang Raymond (Editor), Dehghantanha, Ali (Editor)
Format: eBook
Language:English
Published: Cambridge, MA Syngress 2017
Series:Syngress advanced topics in information security
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 06871nmm a2200577 u 4500
001 EB001915079
003 EBX01000000000000001077981
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780128054482 
050 4 |a TK5103.4837 
100 1 |a Choo, Kim-Kwang Raymond  |e editor 
245 0 0 |a Contemporary digital forensic investigations of cloud and mobile applications  |c edited by Kim-Kwang Raymond Choo, Ali Dehghantanha 
260 |a Cambridge, MA  |b Syngress  |c 2017 
300 |a 1 online resource 
505 0 |a Machine generated contents note: 1. Contemporary Digital Forensics Investigations of Cloud and Mobile Applications / A. Dehghantanha -- References -- 2. Forensics Analysis of Android Mobile VoIP Apps / M. Conti -- 1. Introduction -- 2. Related Work -- 3. Experimental Setup -- 4. Results and Discussion -- 5. Conclusion and Future Work -- References -- 3. Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine / Z. Muda -- 1. Introduction -- 2. Related Work -- 3. Research Methodology -- 4. AIM Forensics -- 5. Conclusion and Future Work -- References -- 4. Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies / R. Mahmod -- 1. Introduction -- 2. Methodology -- 3. Experiment Setup -- 4. Discussion and Analysis -- 5. Conclusion -- References --  
505 0 |a Includes bibliographical references and index 
505 0 |a Appendix 3 Retrieved Artifacts -- Appendix 4 Network Traffic -- References 
505 0 |a 4. Findings: Kippo -- 5.A Conceptual EASY Training Model -- 6. Conclusion and Future Work -- Acknowledgments -- References -- 9. Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory / K.-K.R. Choo -- 1. Introduction -- 2. Background and Related Work -- 3. Methodology -- 4. Cyber Threat Landscape From a Rat Perspective -- 5. Discussion -- 6. Conclusion and Future Work -- Appendix 1 Questionnaire Items -- References -- 10. Forensic Readiness: A Case Study on Digital CCTV Systems Antiforensics / Z. Yunos -- 1. Introduction -- 2. Our Proposed Antiforensics Framework for Digital CCTV Systems -- 3. Case Studies -- 4. Conclusion -- References -- 11. Forensic Visualization: Survey and Future Research Directions / K.-K.R. Choo -- 1. Introduction -- 2. Digital Forensics -- 3. Visualization is Key -- 4. Forensic Visualization Selection Criteria -- 5. Conclusion and Future Research -- References --  
505 0 |a 12. Investigating Storage as a Service Cloud Platform: pCloud as a Case Study / M. Conti -- 1. Introduction -- 2. Research Methodology -- 3. Analysis and Findings -- 4.Network Traffic -- 5. Conclusion -- References -- 13. Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud / K.-K.R. Choo -- 1. Introduction -- 2. Research Methodology -- 3. Findings: SpiderOak -- 4. Findings: JustCloud -- 5. Finding: pCloud -- 6. Conclusion and Future Work -- References -- 14. Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies / T. Dargahi -- 1. Introduction -- 2. Research Methodology -- 3. Results and Discussion -- 4. Reporting and Presentation -- 5. Conclusion -- References -- 15. An Android Cloud Storage Apps Forensic Taxonomy / A. Dehghantanha -- 1. Introduction -- 2. Experiment Setup -- 3. Discussion -- 4. Results -- 5. Conclusion and Future Works -- Appendix 1 List of Application Versions -- Appendix 2 Dataset List (EDRM) --  
505 0 |a 5.Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies / R. Mahmod -- 1. Introduction -- 2. Experiment Setup -- 3. Discussion and Analysis -- 4. Conclusion and Future Works -- References -- 6. Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors / G. Epiphaniou -- 1. Introduction -- 2. Review of Related Work -- 3. Experiment Design -- 4. Results and Discussion -- 5. Forensics Investigation Guideline -- 6. Limitations -- 7. Conclusion and Further Research -- References -- 7. Performance of Android Forensics Data Recovery Tools / K.-K.R. Choo -- 1. Introduction -- 2. Related Work -- 3. Experiment Setup -- 4. Results and Discussions -- 5. Conclusion and Future Works -- References -- 8. Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model / A. Dehghantanha -- 1. Introduction -- 2. Experiment Setup -- 3. Findings: Dionaea --  
653 |a Criminalistique 
653 |a Forensic sciences / fast 
653 |a Cloud computing / fast 
653 |a Infonuagique 
653 |a BUSINESS & ECONOMICS / Infrastructure / bisacsh 
653 |a forensic science / aat 
653 |a Criminalité informatique / Enquêtes 
653 |a Computer crimes / Investigation / fast 
653 |a Cloud computing / http://id.loc.gov/authorities/subjects/sh2008004883 
653 |a Mobile device forensics / fast 
653 |a SOCIAL SCIENCE / General / bisacsh 
653 |a Analyse judiciaire des appareils mobiles 
653 |a Mobile device forensics / http://id.loc.gov/authorities/subjects/sh2014002757 
653 |a Computer crimes / Investigation / http://id.loc.gov/authorities/subjects/sh85029493 
653 |a Forensic sciences / http://id.loc.gov/authorities/subjects/sh90001487 
700 1 |a Dehghantanha, Ali  |e editor 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a Syngress advanced topics in information security 
776 |z 9780128054482 
776 |z 9780128053034 
776 |z 0128054484 
776 |z 0128053038 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128054482/?ar  |x Verlag  |3 Volltext 
082 0 |a 363.2/52 
082 0 |a 500 
082 0 |a 364.1 
082 0 |a 330 
520 |a Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from different types of cloud services, such as digital remnants of cloud applications accessed through mobile devices. This is the first book that covers the investigation of a wide range of cloud services. Dr. Kim-Kwang Raymond Choo and Dr. Ali Dehghantanha are leading researchers in cloud and mobile security and forensics, having organized research, led research, and been published widely in the field. Users will gain a deep overview of seminal research in the field while also identifying prospective future research topics and open challenges