This specific ISBN edition is currently not available.View all copies of this ISBN edition:
“What Kevvie Fowler has done here is truly amazing: He has defined, established, and documented SQL server forensic methods and techniques, exposing readers to an entirely new area of forensics along the way. This fantastic book is a much needed and incredible contribution to the incident response and forensic communities.”
—Curtis W. Rose, founder of Curtis W. Rose and Associates and coauthor of Real Digital Forensics
The Authoritative, Step-by-Step Guide to Investigating SQL Server Database Intrusions
Many forensics investigations lead to the discovery that an SQL Server database might have been breached. If investigators cannot assess and qualify the scope of an intrusion, they may be forced to report it publicly–a disclosure that is painful for companies and customers alike. There is only one way to avoid this problem: Master the specific skills needed to fully investigate SQL Server intrusions.
In SQL Server Forensic Analysis, author Kevvie Fowler shows how to collect and preserve database artifacts safely and non-disruptively; analyze them to confirm or rule out database intrusions; and retrace the actions of an intruder within a database server. A chapter-length case study reinforces Fowler’s techniques as he guides you through a real-world investigation from start to finish.
The techniques described in SQL Server Forensic Analysis can be used both to identify unauthorized data access and modifications and to gather the information needed to recover from an intrusion by restoring the pre-incident database state.
SQL Server Forensic Analysis is the first book of its kind to focus on the unique area of SQL Server incident response and forensics. Whether you’re a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, auditor, or database professional, you’ll find this book an indispensable resource.
"synopsis" may belong to another edition of this title.
Kevvie Fowler is the Director of Managed Security Services at TELUS Security Solutions, where he is responsible for the delivery of specialized security, incident response, and forensic services. In addition to authoring SQL Server Forensic Analysis, he is contributing author of How to Cheat at Securing SQL Server 2005 (Syngress, 2007) and The Best Damn Exchange, SQL, and IIS Book Period (Syngress, 2007).
Kevvie is also the founder of Ring Zero, a research and consulting company that focuses on the security and forensic analysis of Microsoft technologies. In addition to Ring Zero, Kevvie owns and maintains the applicationforensics.com Web site, which he hopes to grow into the leading source of application forensics information on the Internet.
Kevvie is a frequent presenter at leading information security conferences such as Black Hat and SecTor. He is a GIAC Gold Certified Forensic Analyst (GCFA) and Certified Information System Security Professional (CISSP), and he holds several Microsoft certifications, including MCTS, MCDBA, MCSD, and MCSE. Kevvie is also a member of the High Technology Crime Investigation Association (HTCIA).Excerpt. © Reprinted by permission. All rights reserved.:
During a forensic investigation, a digital investigator tracks an intruder’s actions on a system, until “it” happens; the investigator identifies that the intruder has indeed accessed the database.
The database server stores sensitive financial information however it is configured with default database logging and there is no third party logging solution in place. Therefore, even though the investigator identified that the database was accessed, he is left to wonder what actions the intruder performed within the database server. Was credit card data accessed? Was anything modified? This scenario is an all too familiar one, which usually leaves investigators staring into a black hole, desperately needing a way to determine what actions an intruder performed within a database server.
With large data security breaches occurring at an alarming rate, investigators who are unable to properly qualify and assess the scope of a data security breach can be forced to report that all database data may have been exposed during an incident. This can in turn result in organizations disclosing that confidential database data was exposed when, in reality, the incident may not have involved this data.
This book helps avoid the preceding scenario by providing the first in-depth view into the collection and preservation of database artifacts and explaining how they can be analyzed to confirm a database intrusion and retrace the actions of an intruder within the database server. SQL Server forensic techniques as covered in this book can be used to identify unauthorized data access and modifications, as well as to restore the pre-incident database state to recover from the database intrusion.
Why Do We Need This Book, and Why Now?
Within the past few years, our reliance on database technology has increased exponentially. Databases have become an increasingly essential component of some of the world’s largest corporations, and in today’s business world almost all applications use a database to manage data.
As our reliance on databases has increased, so too have attacks targeting the data they store and process. According to Gartner Group, seventy-five percent of cyber attacks are application-based and often involve the theft of personal or financial data stored within a database.
With digital attacks targeting databases on the rise, large data security breaches are occurring at an alarming rate. In response, several regulations have been put in place that hold those who manage and store personal information accountable if and when the confidentiality of this information is compromised.
More specifically, many regulations demand that any organization that collects, uses, or stores their clients’ information must notify impacted clients in the event that their personal information is disclosed. Because of this requirement, it is becoming increasingly important for digital investigators to not only be able to confirm the occurrence of unauthorized database access but also to specifically determine what, if any, sensitive information was accessed.
Who Will Benefit from Reading This Book?
This book will appeal to a wide audience inclusive of digital forensic practitioners, information security analysts, information security managers, information security auditors, database administrators, systems administrators, and law enforcement officials interested in digital forensics, security, or relational databases.
Readers will benefit from reading this book if they are interested in an in-depth view of:
Readers of this book should have a basic understanding of digital forensics and relational databases.
"About this title" may belong to another edition of this title.
Book Description Addison Wesley Professional. Paperback. Condition: Fair. A readable copy. All pages are intact, and the cover is intact. Pages can include considerable notes-in pen or highlighter-but the notes cannot obscure the text. At ThriftBooks, our motto is: Read More, Spend Less. Seller Inventory # G0321544366I5N00
Book Description Addison-Wesley Professional, 2008. Paperback. Condition: Good. Item may show signs of shelf wear. Pages may include limited notes and highlighting. May include supplemental or companion materials if applicable. Access codes may or may not work. Connecting readers since 1972. Customer service is our top priority. Seller Inventory # mon0001010642
Book Description Addison-Wesley Professional, 2008. Condition: Good. A+ Customer service! Satisfaction Guaranteed! Book is in Used-Good condition. Pages and cover are clean and intact. Used items may not include supplementary materials such as CDs or access codes. May show signs of minor shelf wear and contain limited notes and highlighting. Seller Inventory # 0321544366-2-4
Book Description Addison-Wesley Professional, 2008. Paperback. Condition: Good. Item may show signs of shelf wear. Pages may include limited notes and highlighting. May include supplemental or companion materials if applicable. Access codes may or may not work. Connecting readers since 1972. Customer service is our top priority. Seller Inventory # mon0001469223
Book Description Addison-Wesley Professional, 2008. Paperback. Condition: Good. 1. Ships with Tracking Number! INTERNATIONAL WORLDWIDE Shipping available. May not contain Access Codes or Supplements. May be ex-library. Shipping & Handling by region. Buy with confidence, excellent customer service!. Seller Inventory # 0321544366