Redirigiendo al acceso original de articulo en 16 segundos...
ARTÍCULO
TITULO

Forensic Resources For Network Professionals

Stephen J. Specker    
Kenneth R. Janson    

Resumen

Network professionals face an environment characterized by constantly increasing technological complexity and the daunting challenges posed by ill-intentioned intruders.  Securing the systems that they are entrusted to manage is a task of primary importance.  Effective network security includes protocols to detect, to investigate, and to preclude the recurrence of any breach in the installed security systems.         This study investigates principal forensic techniques that are available to the network professional and provides an efficient access path to practical solutions to the post-breach segment of security system design.

 Artículos similares

       
 
Chris Rose    
Bitcoin was not the first attempt at a digital currency, but it has been the most successful and it is now being accepted by a number of major retailers. Bitcoin is a cryptocurrency and operates as a peer-to-peer network. Its security is guaranteed by cr... ver más

 
Pooja Srivastava, Seema Verma, Abhilasha Agarwal, Pooja Pooja, Shradh Gupta     Pág. 1712 - 1717
Cryptographic techniques are necessary for the security of Adhoc Network. These cryptographic Algorithms are obligatory for protection of the user data so that only the permitted user are allowed to access it. This review paper outlines the comparison of... ver más

 
ALI MUHAMMAD    
Terrorism emerged as serious security problem inIndonesia since a network of terrorist group rockedthis country, started from the Bali bombing (2002)followed by other consecutive bombings, such as, J.W. Marriott Hotel bombing (2003), the AustralianEmbass... ver más

 
Nattaya Thaennin, Parichart Visuthismajarn, Pongthep Sutheravut    
We conducted this case study in Songkhla Province in Thailand, with the aim of exploring the participation in a collaborative network for food safety. This study was conducted using a qualitative approach, with data collected from 15 representatives of v... ver más

 
Carl S. Guynes, Yu Andy Wu, John Windsor    
E-Commerce security issues can be grouped under the categories of system availability, data integrity, and data privacy. System availability means that all necessary components are available to support a given users transmission requirements. Data integr... ver más