Cyber Crime and Forensic Computing
eBook - ePub

Cyber Crime and Forensic Computing

Modern Principles, Practices, and Algorithms

Gulshan Shrivastava, Deepak Gupta, Kavita Sharma, Gulshan Shrivastava, Deepak Gupta, Kavita Sharma

  1. 240 pages
  2. English
  3. ePUB (adapté aux mobiles)
  4. Disponible sur iOS et Android
eBook - ePub

Cyber Crime and Forensic Computing

Modern Principles, Practices, and Algorithms

Gulshan Shrivastava, Deepak Gupta, Kavita Sharma, Gulshan Shrivastava, Deepak Gupta, Kavita Sharma

DĂ©tails du livre
Table des matiĂšres
Citations

À propos de ce livre

This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently.

Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law.

Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations.

On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders' abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime.

Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.

Foire aux questions

Comment puis-je résilier mon abonnement ?
Il vous suffit de vous rendre dans la section compte dans paramĂštres et de cliquer sur « RĂ©silier l’abonnement ». C’est aussi simple que cela ! Une fois que vous aurez rĂ©siliĂ© votre abonnement, il restera actif pour le reste de la pĂ©riode pour laquelle vous avez payĂ©. DĂ©couvrez-en plus ici.
Puis-je / comment puis-je télécharger des livres ?
Pour le moment, tous nos livres en format ePub adaptĂ©s aux mobiles peuvent ĂȘtre tĂ©lĂ©chargĂ©s via l’application. La plupart de nos PDF sont Ă©galement disponibles en tĂ©lĂ©chargement et les autres seront tĂ©lĂ©chargeables trĂšs prochainement. DĂ©couvrez-en plus ici.
Quelle est la différence entre les formules tarifaires ?
Les deux abonnements vous donnent un accĂšs complet Ă  la bibliothĂšque et Ă  toutes les fonctionnalitĂ©s de Perlego. Les seules diffĂ©rences sont les tarifs ainsi que la pĂ©riode d’abonnement : avec l’abonnement annuel, vous Ă©conomiserez environ 30 % par rapport Ă  12 mois d’abonnement mensuel.
Qu’est-ce que Perlego ?
Nous sommes un service d’abonnement Ă  des ouvrages universitaires en ligne, oĂč vous pouvez accĂ©der Ă  toute une bibliothĂšque pour un prix infĂ©rieur Ă  celui d’un seul livre par mois. Avec plus d’un million de livres sur plus de 1 000 sujets, nous avons ce qu’il vous faut ! DĂ©couvrez-en plus ici.
Prenez-vous en charge la synthÚse vocale ?
Recherchez le symbole Écouter sur votre prochain livre pour voir si vous pouvez l’écouter. L’outil Écouter lit le texte Ă  haute voix pour vous, en surlignant le passage qui est en cours de lecture. Vous pouvez le mettre sur pause, l’accĂ©lĂ©rer ou le ralentir. DĂ©couvrez-en plus ici.
Est-ce que Cyber Crime and Forensic Computing est un PDF/ePUB en ligne ?
Oui, vous pouvez accĂ©der Ă  Cyber Crime and Forensic Computing par Gulshan Shrivastava, Deepak Gupta, Kavita Sharma, Gulshan Shrivastava, Deepak Gupta, Kavita Sharma en format PDF et/ou ePUB ainsi qu’à d’autres livres populaires dans Informatik et KĂŒnstliche Intelligenz (KI) & Semantik. Nous disposons de plus d’un million d’ouvrages Ă  dĂ©couvrir dans notre catalogue.

Informations

Éditeur
De Gruyter
Année
2021
ISBN
9783110677546

Table des matiĂšres

  1. Title Page
  2. Copyright
  3. Contents
  4. About the editors
  5. A survey of popular digital forensic tools
  6. An insight review on multimedia forensics technology
  7. An overview on advanced multimedia forensic techniques and future direction
  8. Computer forensics and Cyber Crimes: COVID-19 perspective
  9. Biometric forensic tools for criminal investigation
  10. Deep learning for optimization of e-evidence
  11. Electronic voting machine security issues and solution protocol by physical unclonable function
  12. Machine learning for mobile malware analysis
  13. Mobile platform security: issues and countermeasures
  14. Data leakage detection in Wi-Fi networks
  15. Index
  16. De Gruyter Frontiers in Computational Intelligence
Normes de citation pour Cyber Crime and Forensic Computing

APA 6 Citation

[author missing]. (2021). Cyber Crime and Forensic Computing (1st ed.). De Gruyter. Retrieved from https://www.perlego.com/book/2818821/cyber-crime-and-forensic-computing-modern-principles-practices-and-algorithms-pdf (Original work published 2021)

Chicago Citation

[author missing]. (2021) 2021. Cyber Crime and Forensic Computing. 1st ed. De Gruyter. https://www.perlego.com/book/2818821/cyber-crime-and-forensic-computing-modern-principles-practices-and-algorithms-pdf.

Harvard Citation

[author missing] (2021) Cyber Crime and Forensic Computing. 1st edn. De Gruyter. Available at: https://www.perlego.com/book/2818821/cyber-crime-and-forensic-computing-modern-principles-practices-and-algorithms-pdf (Accessed: 15 October 2022).

MLA 7 Citation

[author missing]. Cyber Crime and Forensic Computing. 1st ed. De Gruyter, 2021. Web. 15 Oct. 2022.