Book description
Conduct repeatable, defensible investigations with EnCase Forensic v7
Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic v7 reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample procedures are included throughout this practical guide.
- Install EnCase Forensic v7 and customize the user interface
- Prepare your investigation and set up a new case
- Collect and verify evidence from suspect computers and networks
- Use the EnCase Evidence Processor and Case Analyzer
- Uncover clues using keyword searches and filter results through GREP
- Work with bookmarks, timelines, hash sets, and libraries
- Handle case closure, final disposition, and evidence destruction
- Carry out field investigations using EnCase Portable
- Learn to program in EnCase EnScript
Table of contents
- Cover
- Title Page
- Copyright Page
- About the Author
- Contents at a Glance
- Contents
- Acknowledgments
- Introduction
- Part I: Preparing for the Forensics Function
- Part II: Beginning with EnCase Forensics
- Part III: Looking for Artifacts
- Part IV: Putting It All Together
-
Part V: Automation in EnCase
- Chapter 14: EnCase Portable and App Central
- Chapter 15: An EnScript Primer
-
Part VI: Appendixes
- Appendix A: Rosetta Stone for Windows Operating Systems
- Appendix B: EnCase Version 7 Keyboard Shortcuts
-
Appendix C: Sample Run Books
- Creating a New Case (Chapter 2)
- Relocating Evidence Manually (Chapter 2)
- Backing Up the Current Case (Chapter 3)
- Reacquiring .E01/.Ex01 Evidence (Chapter 3)
- Reacquiring .L01/.Lx01 Evidence (Chapter 3)
- Encrypting an Evidence File (See Reacquiring Evidence)
- Adding/Acquiring a Local Device (Chapter 4)
- Adding an EnCase Evidence File (Logical or Physical) (Chapter 4)
- Adding a Raw Image (Chapter 4)
- Acquiring a Smartphone (Chapter 4)
- Creating a New Case (Chapter 5)
- Verifying an Evidence File without Opening a Case (Chapter 5)
- Setting the Time Zone (Chapter 5)
- Processing and Preparation of Initial Case Evidence (Chapter 5)
- Mounting Files with Internal Structure (Compound Files) Individually (Chapter 6)
- Manually Verifying Evidence (Chapter 6)
- Regenerating the Case.sqlite Database (Chapter 8)
- Searching in the Evidence Browser (Chapter 9)
- Running an Existing Condition (Chapter 10)
- Running an Existing Filter (Chapter 10)
- Creating a Hash Library (Chapter 11)
- Creating a New Hash Set Inside the Library (Chapter 11)
- Adding Results to Your Hash Library from a Case (Chapter 11)
- Importing the NSRL Hash Library (Chapter 11)
- Generating a Report (Chapter 12)
- Creating a New Report Template (Chapter 12)
- Preparing a Case Package for Archiving (Chapter 13)
- Wiping a Drive with EnCase (Chapter 13)
- Restoring the EnCase Portable USB Device (Chapter 14)
- Preparing Additional Storage Devices for Use with EnCase Portable (Chapter 14)
- Launching EnCase Portable Management (Chapter 14)
- Collecting from a Powered-On Computer (Chapter 14)
- Collecting from a Powered-Off Computer (Chapter 14)
- Importing Evidence from EnCase Portable into EnCase Forensic (Chapter 14)
- Appendix D: EnScript Class Hierarchy
- Index
Product information
- Title: Computer Forensics and Digital Investigation with EnCase Forensic v7
- Author(s):
- Release date: May 2014
- Publisher(s): McGraw-Hill
- ISBN: 9780071807920
You might also like
book
Computer Forensics InfoSec Pro Guide
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of …
book
The Best Damn Cybercrime and Digital Forensics Book Period
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched …
book
Implementing Digital Forensic Readiness
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …