Keeping a data trail is the best defense

Musthaler, Linda
September 1997
Network World;09/01/97, Vol. 14 Issue 35, p41
Trade Publication
Offers tips to computer network managers in the guardianship of evidential data. Work of the US Federal Bureau of Investigation's computer forensics division; Levels of hidden data locations; Usage of computer forensics evidence; Steps to avoid liability for the company.


Related Articles

  • IMPLEMENTATION AND TEST OF A SECURE MECHANISM'S MODULES IN ROUTING PROTOCOL OF MANETS WITH THE THEORY OF GAMES. Konate, Karim; Gaye, Abdourahime // International Journal of Network Security & Its Applications;Jul2012, Vol. 4 Issue 4, p215 

    The present work is dedicated to the implementation of a secure mechanism's modules in routing protocol of MANET with the theory of games. First we are doing an introduction to what the Mobile Ad hoc Networks (MANETs) and a presentation of some various attacks in MANETs pertaining to fail...

  • Secure Next Gen Data Centers. Mankotia, Vic // Voice & Data;May2014, Vol. 21 Issue 5, p40 

    The article discusses the need for companies to enhance security structure to their data centers as they are moving at a faster rate. It highlights several critical issues such as the increasing data traffic and network connections as well as virtualization of the data centers and increasing...

  • An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode. Singh, Parminder; Kaur, Damandeep // International Journal of Computer Applications;Jul2013, Vol. 73 Issue 1-22, p26 

    Due to dynamic topology and non-wired infrastructure of Wireless Sensor Networks (WSN), they are prone to attacks. Wormhole attack is one of the most popular and serious attack in WSNs. In Wormhole attack two or more malicious nodes makes a covert channel which attracts the traffic towards...

  • Keeping your data center safe.  // Caribbean Business;8/27/2015, Vol. 43 Issue 33, p46 

    The article focuses on how health care providers can keep their data center safe from physical security attack. Topics include the need to implement a physical-security plan to avoid risk of security breaches, the use of the Infrastructure as a Platform from security systems provider Anixter,...

  • SCALABLE DDOS MITIGATION SYSTEM FOR DATA CENTERS. MARTINASEK, Zdenek // Advances in Electrical & Electronic Engineering;2015 Special Issue, Vol. 13 Issue 4, p325 

    Distributed Denial of Service attacks (DDoS) have been used by attackers for over two decades because of their effectiveness. This type of the cyber-attack is one of the most destructive attacks in the Internet. In recent years, the intensity of DDoS attacks has been rapidly increasing and the...

  • Failure Detection in Network Forensics for Volatile Data Acquisition. Nassif, Lilian Noronha // Proceedings of the International Conference on Cyber Warfare & S;2014, p342 

    Acts committed in cyber attacks are often difficult to identify because attackers remove incriminating traces. Digital forensics provides evidence of illegal actions in the digital world. One of its branches, network forensics, can record the entire communication flow between the attacker and...

  • BYZANTINE BEHAVIOUR (B2) - MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN ADHOC NETWORK. Raebra, S. Albert; Vijayalakshmi, S. // International Journal of Network Security & Its Applications;Jul2010, Vol. 2 Issue 3, p119 

    Ad-hoc networks are an emerging area of mobile computing and an efficient paradigm for multicast communication. The security challenges faced by the network due to their inherent unique characteristics are exacerbated in case of multicast communication. Group communication in ad hoc network is...

  • How to solve the enterprise mobility puzzle. Bednarz, Ann // NetworkWorld Asia;Oct/Nov2009, Vol. 5 Issue 5, p20 

    The article offers tips for businesses and industries on how to solve enterprise mobility issues. It is claimed that the mobility strategy of businesses and industries should include virtualization, service-oriented architecture (SOA), computer security, management and network access. It is...

  • A Cloud Forensic Readiness Model for Service Level Agreements Management. De Marco, Lucia; Ferrucci, Filomena; Kechadi, Tahar // Proceedings of the European Conference on e-Learning;2015, p346 

    Cloud computing is increasingly becoming a target of cyber-criminal attacks. Often the committed crimes violate the Service Level Agreement (SLA) contracts, which must be respected by all the involved parties. Cloud Forensics is a branch of Digital Forensic discipline dealing with crimes...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics