This thoroughly revised edition of an Artech House bestseller goes far beyond the typical computer forensics books on the market, emphasizing how to protect one's privacy from data theft and hostile computer forensics. The second edition has been updated to offer more detailed how-to guidance on protecting the confidentiality of data stored on computers, and specific information on the vulnerabilities of commonly used ancillary computing devices, such as PDAs, cellular telephones, smart cards, GPS devices, telephone calling cards, fax machines, and photocopiers. This cutting-edge book helps you identify the specific areas where sensitive and potentially incriminating data is hiding in personal computers and consumer electronics, and explains how to go about truly removing this data because mere deletionù or even overwritingù does not accomplish this. You get a systematic process for installing operating systems and application software that will help to minimize the possibility of security compromises, and numerous specific steps that need to be taken to prevent the hostile exploitation of one's computer. This unique resource provides a method for ensuring that computers that are connected to the Internet are protected from malicious mobile code (code that can allow a remote hacker to read, remove, damage, or even add data to one's computer) the new fashion of adware/spyware, and Web bugs.ù Moreover, you learn how to detect whether advanced investigative tools, such as keystroke storing and relaying hardware and software, are in use in a computer. You also learn of commercially available capabilities for intercepting radio signals unintentionally radiated by a computer. Other critical topics include the pitfalls of encryption and how to use it effectively, the practical aspects of online anonymity, and the current legal issues that pertain to the use of computers.
Table Of Contents
Introduction.; Part 1: The Hype of Computer Forensics ë What Is Computer Forensics and Why Is It of Vital Interest to You? Incriminating Data Can Enter One 's Computer Without One 's Complicity or Knowledge. Defending from False Accusations Based on Data Found in One 's Computer. Exactly Where Is Potentially Incriminating Data Stored in One 's Computer and How Did It Get There. Specialized Forensics Techniques. How Can Evidence or Data Be Taken from One 's Computer? Fallacies about Protecting One 's Confidential Data from Hostile Forensics or Other Means of Theft.; Part 2: Computer Privacy And Security - Protecting Proprietary Information from Unauthorized Snooping and From Hostile Computer Forensics. Practical Means of Protecting Proprietary and Other Confidential Information in Computers. Basic, Intermediate and Advanced Online Protection from Computer Forensics and from Privacy Compromises. A Refresher on the Relevant Technical Aspects of the Underlying Technologies. Practical Encryption to Protect Proprietary Information from Hostile Forensics. ; Part 3: Evolving Technologies and Legal Issues ë Regarding Data and Threats to Privacy from the Use of Photocopiers, Fax Machines, Digital Cameras, Cellphones, MP3 Players, and Other Consumer Electronics. Security Threats from the Use of Wi-FI Wireless Devices. Bluetooth Security. VPNs. Legal Issues and Legal Defense.; About the Author.; Glossary.;
Michael A. Caloyannides
Michael A. Caloyannides is a senior fellow at Mitretek Systems in McLean, VA. He received his Ph.D. in electrical engineering, applied mathematics and philosophy from California Institute of Technology. He is an adjunct professor at two renown universities and a regular columnist and associate editor for IEEE Computer Society's 'Security and Privacy'ù magazine.