Learning from the Past Intrusion Attacks: Digital Evidence Collection to Make e-Commerce Systems More Secure
dc.contributor.author | Lokhande, P. S. | |
dc.date.accessioned | 2014-11-11T10:36:53Z | |
dc.date.available | 2014-11-11T10:36:53Z | |
dc.date.issued | 2009-09 | |
dc.description.abstract | Use of computers, data communication and data storage devices has become so ubiquitous that most of the crimes or civil disputes have involvement in some way. There will be a large demand for computer forensics in the coming days. Computer forensic has four phases: Collection, Presentation, Filtering and presentation. Computer Forensic: It is an art and science of applying computer science to aid the legal process. Computer involvement in crime such as fraud, child pornography and threatening emails. Another situation where computers commonly assist in a crime is intellectual property theft in the corporate environment. Computers were the targets of the crime such as during a Denial of Service (DoS) attack against an E-Commerce site. It is often less obvious than previous cases. Computer contains information that is incidental to the crime such as a database containing the payment and receipts list of gamblers, drug traffickers, and scammers. Pay and receipts (owe) are the documents made in spreadsheets to keep track of their customers and suppliers. In the same cases other innocent bystanders computers, WiFi networks may have hacked to send threatening mail for example mails sent by terrorist group before the bomb Blast in various cities of India. | en_US |
dc.identifier.citation | September 23-25, 2009 Villach, Austria | en_US |
dc.identifier.uri | http://hdl.handle.net/123456789/1099 | |
dc.language.iso | en | en_US |
dc.publisher | Conference ICL2009 | en_US |
dc.subject | Staff Publication - SoET | en_US |
dc.subject | Staff Publication - CO | en_US |
dc.title | Learning from the Past Intrusion Attacks: Digital Evidence Collection to Make e-Commerce Systems More Secure | en_US |
dc.type | Article | en_US |