Nothing Special   »   [go: up one dir, main page]

Carrier, 2006 - Google Patents

Risks of live digital forensic analysis

Carrier, 2006

View HTML @Full View
Document ID
12242009085798452223
Author
Carrier B
Publication year
Publication venue
Communications of the ACM

External Links

Snippet

Risks of live digital forensic analysis Page 1 56 February 2006/Vol. 49, No. 2 COMMUNICATIONS OF THE ACM our network intrusion detection system (NIDS) generates an alert that an attack has been launched against an internal server. You deploy the incident …
Continue reading at dl.acm.org (HTML) (other versions)

Similar Documents

Publication Publication Date Title
Carrier Risks of live digital forensic analysis
King et al. Backtracking intrusions
King et al. Backtracking intrusions
US9306956B2 (en) File system level data protection during potential security breach
US8484737B1 (en) Techniques for processing backup data for identifying and handling content
EP2245572B1 (en) Detecting rootkits over a storage area network
CN110647744A (en) Identifying and extracting key hazard forensic indicators using object-specific file system views
US20090164522A1 (en) Computer forensics, e-discovery and incident response methods and systems
Hassan Digital forensics basics: A practical guide using Windows OS
KR101223594B1 (en) A realtime operational information backup method by dectecting LKM rootkit and the recording medium thereof
US8429429B1 (en) Computer security system and method
Fowler SQL server forenisc analysis
TWI607338B (en) Storage device, data protection method therefor, and data protection system
Lemmou et al. A behavioural in‐depth analysis of ransomware infection
Gionta et al. Seer: practical memory virus scanning as a service
Bottazzi et al. Preventing ransomware attacks through file system filter drivers
Gurkok Cyber forensics and incident response
JP6602471B2 (en) Techniques for automated application analysis
Zdzichowski et al. Anti-forensic study
Hsu et al. Data concealments with high privacy in new technology file system
CN116415240A (en) Lexovirus detection method and related system
Roussev The cyber security body of knowledge
US20110154493A1 (en) Methods for inspecting data and devices thereof
RU2802539C1 (en) Method for identifying information security threats (options)
Shan et al. An OS Security Protection Model for Defeating Attacks from Network