Chapter 2. Overview of Computer Crime

IN CHAPTER 1, "SYSTEM FORENSICS FUNDAMENTALS," you learned that a computer can play one of three roles in a computer crime. It can be the target of the crime, it can be the instrument of the crime, or it can serve as an evidence repository that stores valuable information about the crime. As technology evolves, cyberattacks grow in sophistication and frequency. In recent years, these attacks have become more widespread, diverse, and financially damaging.

System forensics personnel fight computer crime, or cybercrime. They do so by identifying and analyzing evidence to put together a picture of what happened, when, where, how, and why. Forensic analysts may be directly involved in identifying offenders and ...

Get System Forensics, Investigation, and Response now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.