Abstract
![CDATA[Advances in Digital Technology have presented new challenges to both Industry and Law. Technology security experts are enhancing platforms security to protect enterprise and government from intrusions, whereas legal experts are adopting new techniques to investigate ldquoillegalrdquo breaches to systems and networks. This paper provides an overview of Digital Forensics methodologies, computer and network vulnerabilities and security measures, forensics tracking mechanisms to detect and deter intruders. A case study for tracing a Distributed DoS attack is also presented.]]
Original language | English |
---|---|
Title of host publication | Proceedings of the International Conference on Computer Engineering & Systems : ICCES'08, Held in Cairo, Egypt, 25 November, 2008 |
Publisher | IEEE |
Number of pages | 5 |
ISBN (Print) | 9781424421152 |
Publication status | Published - 2008 |
Event | International Conference on Computer Engineering & Systems - Duration: 14 Dec 2009 → … |
Conference
Conference | International Conference on Computer Engineering & Systems |
---|---|
Period | 14/12/09 → … |
Keywords
- computer networks
- data protection
- computer security
- computer crimes
- investigation
- digital forensics