NCJ Number
              174742
          Date Published
  1998
Length
              196 pages
          Annotation
              This book emphasizes traditional investigative skills as the keystone to solving computer crimes and offers training in fundamental investigative methods such as observation and logic, and covers topics as diverse as solvability factors, retail computer security, crimes associated with the Internet, and intelligence gathering techniques.
          Abstract
              Designed for security managers and investigators, the book moves through the basic phases of a computer crime investigation. It starts with establishing evidence of a crime and then moves on to determining how the crime occurred, identifying likely suspects, developing the case for prosecution, proving damages, and assessing perpetrators as targets for civil litigation. The book specifically covers investigative measures, information security, and fraud on the Internet, as well as preserving evidence from attacks on computer hardware and environmental support systems and computer hardware. Countermeasures security managers can implement to deal with computer crime are described. An appendix contains further information on information warfare and computer security. References, tables, and figures