Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Für diesen Artikel ist leider kein Bild verfügbar.

Investigating Data Hiding and Covert Communication

Buch | Softcover
300 Seiten
2019
De|G Press (Verlag)
978-1-5015-1521-7 (ISBN)
CHF 59,95 inkl. MwSt
  • Titel wird leider nicht erscheinen
  • Artikel merken
The book will focus on incident response methods and techniques when faced with the unprecedented challenge that data hiding and covert communication pose. All three states of data hiding and covert communication will be considered. When data is at rest (Desktop and Mobile Devices) When data is in motion (overtly and covertly communicated) When data is in use (on any computing platform) This book is for practitioners, forensic investigators, educators, students, private investigators, or anyone advancing digital forensics for investigating cybercrime. Additionally, the book will include open source examples and tools that will aid investigators and incident response personnel in dealing with this threat. Investigating Data Hiding and Covert Communications will be the first book to directly focus on one of the most daunting challenges that investigators and incident respond personnel face today.

Chet Hosmer, Founder of Python Forensics Inc., Co-founder and former CEO/Chief Scientist of WetStone Technologies, Inc., USA

Chapter 1: What is Data Hiding and Covert Communication (50 Pages)





History and overview of data hiding, encryption and steganography.




How is data hiding being used to cover incriminating data?




What is covert communications and what are the current and future impacts?




How are criminals using encryption and steganography to covertly communicate?




How are criminals using encryption as the key weapon in Ransomware crimes?




Chapter summary



Chapter 2: Investigating Hidden Data at Rest (70 Pages)





Legal challenges and considerations




Key challenges when encrypted data is at rest




Identifying encrypted files, not as easy as you might think




Assessing the encrypted content for weaknesses




Methodologies and tools for attacking and deciphering encrypted content




Discovering evidence of steganography use




Identifying files that contain steganographic content




Identifying weaknesses in differing steganography approaches




Methodologies and tools for attacking and recovering data from stego’d images




Chapter Summary



Chapter 3: Investigating Data in Motion and Covert Communications (80 Pages)





Common operational models for exchanging secret content




Discovering weak links in secret message exchange




Discovering who and when secret message exchange is occurring




Identifying potential weaknesses in the communication exchange




Methodologies and tools for attacking and deciphering encrypted messages




What is covert communications and covert channels




How to identify covert channel usage




How to jam or disrupt covert channels




How to intercept and tag covert channel communications




Chapter Summary



Chapter 4: Investigating Hidden Data during Use (50 Pages)





When data hiding is most vulnerable and most dangerous




How can we gain access to the data when most vulnerable?




How can we use this data to prevent or disrupt criminal activity?




Methodologies and tools that attack hidden data while in use




Chapter summary



Chapter 5: The Investigators Data Hiding Toolkit (50 Pages)





Open Source Tool Summary




Putting the Open Source Tools to work




Case studies and examples




Chapter summary



Chapter 6: Future Considerations (15 Pages)





What are the obvious next steps? (Evolutionary)




What are the not so obvious next steps? (Revolutionary)




Closing Remarks

Erscheint lt. Verlag 1.9.2019
Zusatzinfo 5 Tables, black and white; 10 Illustrations, black and white; b/w graphics
Verlagsort Boston
Sprache englisch
Maße 170 x 240 mm
Themenwelt Informatik Datenbanken Data Warehouse / Data Mining
Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Schlagworte Big Data, Security, Cybercrime, Cybersecurity, Digital Forensics, Cyber Threat, Covert Communications
ISBN-10 1-5015-1521-7 / 1501515217
ISBN-13 978-1-5015-1521-7 / 9781501515217
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
eine Einführung mit Python, Scikit-Learn und TensorFlow

von Oliver Zeigermann; Chi Nhan Nguyen

Buch | Softcover (2024)
O'Reilly (Verlag)
CHF 27,85
Von den Grundlagen bis zum Produktiveinsatz

von Anatoly Zelenin; Alexander Kropp

Buch (2025)
Hanser (Verlag)
CHF 69,95