Contemporary digital forensic investigations of cloud and mobile applications

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date an...

Full description

Bibliographic Details
Other Authors: Choo, Kim-Kwang Raymond (Editor), Dehghantanha, Ali (Editor)
Format: eBook
Language:English
Published: Cambridge, MA Syngress 2017
Series:Syngress advanced topics in information security
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Machine generated contents note: 1. Contemporary Digital Forensics Investigations of Cloud and Mobile Applications / A. Dehghantanha
  • References
  • 2. Forensics Analysis of Android Mobile VoIP Apps / M. Conti
  • 1. Introduction
  • 2. Related Work
  • 3. Experimental Setup
  • 4. Results and Discussion
  • 5. Conclusion and Future Work
  • References
  • 3. Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine / Z. Muda
  • 1. Introduction
  • 2. Related Work
  • 3. Research Methodology
  • 4. AIM Forensics
  • 5. Conclusion and Future Work
  • References
  • 4. Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies / R. Mahmod
  • 1. Introduction
  • 2. Methodology
  • 3. Experiment Setup
  • 4. Discussion and Analysis
  • 5. Conclusion
  • References
  • Includes bibliographical references and index
  • Appendix 3 Retrieved Artifacts
  • Appendix 4 Network Traffic
  • References
  • 4. Findings: Kippo
  • 5.A Conceptual EASY Training Model
  • 6. Conclusion and Future Work
  • Acknowledgments
  • References
  • 9. Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory / K.-K.R. Choo
  • 1. Introduction
  • 2. Background and Related Work
  • 3. Methodology
  • 4. Cyber Threat Landscape From a Rat Perspective
  • 5. Discussion
  • 6. Conclusion and Future Work
  • Appendix 1 Questionnaire Items
  • References
  • 10. Forensic Readiness: A Case Study on Digital CCTV Systems Antiforensics / Z. Yunos
  • 1. Introduction
  • 2. Our Proposed Antiforensics Framework for Digital CCTV Systems
  • 3. Case Studies
  • 4. Conclusion
  • References
  • 11. Forensic Visualization: Survey and Future Research Directions / K.-K.R. Choo
  • 1. Introduction
  • 2. Digital Forensics
  • 3. Visualization is Key
  • 4. Forensic Visualization Selection Criteria
  • 5. Conclusion and Future Research
  • References
  • 12. Investigating Storage as a Service Cloud Platform: pCloud as a Case Study / M. Conti
  • 1. Introduction
  • 2. Research Methodology
  • 3. Analysis and Findings
  • 4.Network Traffic
  • 5. Conclusion
  • References
  • 13. Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud / K.-K.R. Choo
  • 1. Introduction
  • 2. Research Methodology
  • 3. Findings: SpiderOak
  • 4. Findings: JustCloud
  • 5. Finding: pCloud
  • 6. Conclusion and Future Work
  • References
  • 14. Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies / T. Dargahi
  • 1. Introduction
  • 2. Research Methodology
  • 3. Results and Discussion
  • 4. Reporting and Presentation
  • 5. Conclusion
  • References
  • 15. An Android Cloud Storage Apps Forensic Taxonomy / A. Dehghantanha
  • 1. Introduction
  • 2. Experiment Setup
  • 3. Discussion
  • 4. Results
  • 5. Conclusion and Future Works
  • Appendix 1 List of Application Versions
  • Appendix 2 Dataset List (EDRM)
  • 5.Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter, and Telegram as Case Studies / R. Mahmod
  • 1. Introduction
  • 2. Experiment Setup
  • 3. Discussion and Analysis
  • 4. Conclusion and Future Works
  • References
  • 6. Mobile Phone Forensics: An Investigative Framework Based on User Impulsivity and Secure Collaboration Errors / G. Epiphaniou
  • 1. Introduction
  • 2. Review of Related Work
  • 3. Experiment Design
  • 4. Results and Discussion
  • 5. Forensics Investigation Guideline
  • 6. Limitations
  • 7. Conclusion and Further Research
  • References
  • 7. Performance of Android Forensics Data Recovery Tools / K.-K.R. Choo
  • 1. Introduction
  • 2. Related Work
  • 3. Experiment Setup
  • 4. Results and Discussions
  • 5. Conclusion and Future Works
  • References
  • 8. Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model / A. Dehghantanha
  • 1. Introduction
  • 2. Experiment Setup
  • 3. Findings: Dionaea