Computer Crime Investigation Framework (CCIF)

We are developing a structured approach for Computer Crime Investigation to assist law enforcement agencies that lack the time, resource and money.  The first draft of this methodology is expected to release in the start of 2005. Brief overview of this framework is given below.
Target Audience
  • Penetration Tester, Security Auditor and Security testers
  • Security engineers and consultants
  • System/network/Web administrators
  • Security testing project managers
  • Technical and Functional Managers
  • IT Staff responsible for information security

TABLE OF CONTENTS
Chapter 1: Nuts and Bolts of Computer Forensics and Incident Response
  1. Introduction to Cyber Crime
  2. Type of Cyber Crime
  3. Understanding Cyber Crime World
    Understanding Cyber Victims
    Understanding Cyber Criminal
    Understanding Cyber Investigator
  4. Challenges of Cyber Crime
    New technologies and new vulnerabilities
    Choices of Cyber Criminals
    Broadband
    E-Commerce and Online Banking
    Instant Messaging
    Mobile Computing
    New Operating Systems and Applications
    Standardization
    Web and Mail Technologies
    Wireless
    Thwarting the Cyber Criminal
  5. Evidence gathering process
  6. Understanding Volatility of Evidence
  7. Creating a Forensic Boot Disk
Chapter 2: Recovering and Preserving Evidence
  1. Protecting Evidence (Disk Imaging)
  2. Auditing and Logging Procedure
  3. Examining log files and their size
  4. Centralized Logging
  5. Collecting Evidence using sniffers
  6. Time Synchronization and Stamping
  7. Searching Keywords
  8. Recovering evidence
    Deleted files
    Locating web cache and browser history data
    From temporary files
    From print spooler files
    From swap and page files
    From Backups
    Finding and decrypting encrypted files
    Recovering data from hidden files
        Hidden files
        Steganography files
        Password protected compressed files
    Cracking password protection
    Collecting data from Memory
    From Registry
    Viewing and Editing the Registry
    Collecting the Registry Data
    Analyzing the Registry Data
    Collecting Deleted files through the Recycle Bin
    Collecting E-mails
  9. Router Log, Reports, Alarms and Alerts
  10. Firewall Log, Reports, Alarms and Alerts
  11. Hacking tools Forensics
Chapter 3: Back Tracing
  1. Email Header Analysis
  2. Tracing a domain name or IP Address
Chapter 4: Miscellaneous Cyber Crime Detection Techniques
  1. IP address spoofing
  2. Anti Detection techniques
  3. Decoy techniques ( HoneyNet, HonePot and Other Cyber Stings)
  4. Intrusion Detection System
If you are interested to contribute and/or want latest and greatest document, contact us at [email protected] This e-mail address is being protected from spambots. You need JavaScript enabled to view it

你可能感兴趣的:(framework,Computer,Crime,Investigation,(CCIF))