Examining Emerging and Hybrid Technologies
- Available for pre-order. Item will ship after August 20, 2021
Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations.
A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence, related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today’s and tomorrow’s emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.
Table of Contents
Chapter 1 -- Cyber Forensics: Compliance and Auditing
Chapter 2 -- IoT and the Role of Cyber Forensics
Chapter 3 -- Cyber Forensics Examination of Unmanned Aerial Systems (UAS) and Unmanned Aerial Vehicles (UAV)
Chapter 4 -- Cloud Computing Forensics
Chapter 5 – Forensics of the Digital Social Triangle with an Emphasis on Deep Fakes.
Chapter 6 -- Operational Technology, Security and Cyber Forensics
Chapter 7 -- Cyber Forensics and Risk Management.
Chapter 8 -- Mobile Device Forensics: An Introduction
Chapter 9 -- Forensic Accounting and the Use of E-Discovery and Cyber Forensics
Chapter 10 -- Cyber Forensic Tools and Utilities
Albert (Al) Marcella, Ph.D., CISA, CISM, is a Professor of Management in the Management Department, Walker School of Business and Technology, at Webster University in Saint Louis, Missouri. Dr. Marcella is also President of Business Automation Consultants, (BAC) LLC, an international IT consultancy firm, which he founded in 1984. Dr. Marcella is an internationally recognized public speaker, researcher, IT consultant and workshop and seminar leader with 40 years of experience in IT audit, risk management, IT security and assessing internal controls. Dr. Marcella has authored numerous articles and 28 books on various IT, audit and security related subjects. Dr. Marcella’s clients include organizations in financial services, IT, banking, petrol-chemical, transportation, services industry, domestic and international public utilities, and departments of government, nonprofits and international agencies.
To gain access to the instructor resources for this title, please visit the Instructor Resources Download Hub. You will be prompted to fill out a registration form which will be verified by one of our sales reps.