O'Reilly logo

System Forensics, Investigation, and Response by K Rudolph, John R. Vacca

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Overview of Computer Crime

IN CHAPTER 1, "SYSTEM FORENSICS FUNDAMENTALS," you learned that a computer can play one of three roles in a computer crime. It can be the target of the crime, it can be the instrument of the crime, or it can serve as an evidence repository that stores valuable information about the crime. As technology evolves, cyberattacks grow in sophistication and frequency. In recent years, these attacks have become more widespread, diverse, and financially damaging.

System forensics personnel fight computer crime, or cybercrime. They do so by identifying and analyzing evidence to put together a picture of what happened, when, where, how, and why. Forensic analysts may be directly involved in identifying offenders and in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required