Showing posts with label review:. Show all posts
Showing posts with label review:. Show all posts

29 March 2011

Book Review: Computer Investigation by Elizabeth Bauchner

That is the target audience for this book?Think again. This book is not targeted for computer professionals. If you have a degree in computer science or simply know a lot about computers, you learn anything from this book. This book is intended for children in the age group middle school, but it would also be a good book of introduction for adults.That said, what the book speak?What is the science of computer forensics?Computer forensics is a two step process. First of all, data is retrieved and then data are used. It is different from the other forensic sciences because data usually stands on its own and should not be interpreted.What are the obligations of many a computer forensics technician?While doing their work, computer forensic must retain evidence not introduce viruses or to a system to properly handle data, retain the evidence in the chain of command, to reduce the impact of the analysis of the system on businesses affected, and make sure privileged information is not disclosed.Following these rules, professional computer forensic find hidden files, swap files and temporary files used by the operating system and applications. They access these files and encrypted and protected files, seeking information relevant to the case. They analyze the found data, especially in the normally inaccessible areas. They perform an analysis of the system and the list of all the relevant files. They provide a notice on the page of the system and who is the author of the files. They are notes of attempts to delete or protect files, and they provide the testimony of expert or consultation in court as needed.The book gives definitions for commonly used words, or jargon, in the industry.A hacker is someone who is really interested in a piece of technology and learns all the possible technology.A hacker is a person who uses their knowledge to bad hacker.Hackers are white hat and black hat hackers crackers.A phreaker was a person who is rip off of the telephone company to obtain free long distance calls.Identity theft is imitating a website (or email) so that the receiver thinks that the sender is someone else.Phishing attempts to get the information of those who, like their user accounts and passwords and social security numbers.A virus is a program to another program, which infects a system when the program is opened. The virus can do nothing unless the program is opened and ran.A worm is a virus, but it can replicate without other programs being opened.A Trojan horse is a program which pretended to be another type of program.Denial of Service (DoS) is when an attacker attempts to prevent a system to be accessible by normal users.