Investigating Data Hiding and Covert Communication
De|G Press (Verlag)
978-1-5015-1521-7 (ISBN)
- Titel wird leider nicht erscheinen
- Artikel merken
Chet Hosmer, Founder of Python Forensics Inc., Co-founder and former CEO/Chief Scientist of WetStone Technologies, Inc., USA
Chapter 1: What is Data Hiding and Covert Communication (50 Pages)
History and overview of data hiding, encryption and steganography.
How is data hiding being used to cover incriminating data?
What is covert communications and what are the current and future impacts?
How are criminals using encryption and steganography to covertly communicate?
How are criminals using encryption as the key weapon in Ransomware crimes?
Chapter summary
Chapter 2: Investigating Hidden Data at Rest (70 Pages)
Legal challenges and considerations
Key challenges when encrypted data is at rest
Identifying encrypted files, not as easy as you might think
Assessing the encrypted content for weaknesses
Methodologies and tools for attacking and deciphering encrypted content
Discovering evidence of steganography use
Identifying files that contain steganographic content
Identifying weaknesses in differing steganography approaches
Methodologies and tools for attacking and recovering data from stego’d images
Chapter Summary
Chapter 3: Investigating Data in Motion and Covert Communications (80 Pages)
Common operational models for exchanging secret content
Discovering weak links in secret message exchange
Discovering who and when secret message exchange is occurring
Identifying potential weaknesses in the communication exchange
Methodologies and tools for attacking and deciphering encrypted messages
What is covert communications and covert channels
How to identify covert channel usage
How to jam or disrupt covert channels
How to intercept and tag covert channel communications
Chapter Summary
Chapter 4: Investigating Hidden Data during Use (50 Pages)
When data hiding is most vulnerable and most dangerous
How can we gain access to the data when most vulnerable?
How can we use this data to prevent or disrupt criminal activity?
Methodologies and tools that attack hidden data while in use
Chapter summary
Chapter 5: The Investigators Data Hiding Toolkit (50 Pages)
Open Source Tool Summary
Putting the Open Source Tools to work
Case studies and examples
Chapter summary
Chapter 6: Future Considerations (15 Pages)
What are the obvious next steps? (Evolutionary)
What are the not so obvious next steps? (Revolutionary)
Closing Remarks
| Erscheint lt. Verlag | 1.9.2019 |
|---|---|
| Zusatzinfo | 5 Tables, black and white; 10 Illustrations, black and white; b/w graphics |
| Verlagsort | Boston |
| Sprache | englisch |
| Maße | 170 x 240 mm |
| Themenwelt | Informatik ► Datenbanken ► Data Warehouse / Data Mining |
| Informatik ► Netzwerke ► Sicherheit / Firewall | |
| Mathematik / Informatik ► Informatik ► Theorie / Studium | |
| Schlagworte | Big Data, Security, Cybercrime, Cybersecurity, Digital Forensics, Cyber Threat, Covert Communications |
| ISBN-10 | 1-5015-1521-7 / 1501515217 |
| ISBN-13 | 978-1-5015-1521-7 / 9781501515217 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich