首页    期刊浏览 2024年12月02日 星期一
登录注册

文章基本信息

  • 标题:Cyber Attack Detection Techniques – Solutions
  • 本地全文:下载
  • 作者:P.Vishalini ; K.Swaroopa Rani ; Ch.Vimala
  • 期刊名称:International Journal of Computer Science and Information Technologies
  • 电子版ISSN:0975-9646
  • 出版年度:2016
  • 卷号:7
  • 期号:2
  • 页码:799-801
  • 出版社:TechScience Publications
  • 摘要:The intensification of Information andCommunication Technologies usage in all facets of lifeexceedingly amplify the incidents of information securitypolicy breaches, cyber crimes, fraud, commercial crimes,cyber laundering etc, hence require a well developedapproach to tackle these incidents in order to realize legallydefensible digital evidence. Since electronic evidence is fragileand can easily be modified, finding this data, collecting,preserving, and presenting it properly in a court of law is thereal challenge. There is a need for use of semantic analysis todiscover underlying security policy requirements andinternal power structures and institutionalization of anticyber attack, anti money-laundering and regulatory schemes.The first responders to cyber security incidents often thanalways are an organization ICT personnel who aretechnically sound though may be deficient in investigativeskill. The scientific standards of cyber forensics dictates theprocedure as it promotes objectivity, a precise and welldocumented analysis, particularly that the findings may beused as evidence against the attacker. This paper aims tocontribute to the advancement of the cyber forensicsdiscipline with a view to assist the International communityin combating this sophisticated, high-tech, dynamic everchanging phenomenon.
国家哲学社会科学文献中心版权所有