Please use this identifier to cite or link to this item:
Title: Learning from the Past Intrusion Attacks: Digital Evidence Collection to Make e-Commerce Systems More Secure
Authors: Lokhande, P. S.
Keywords: Staff Publication - SoET
Staff Publication - CO
Issue Date: Sep-2009
Publisher: Conference ICL2009
Citation: September 23-25, 2009 Villach, Austria
Abstract: Use of computers, data communication and data storage devices has become so ubiquitous that most of the crimes or civil disputes have involvement in some way. There will be a large demand for computer forensics in the coming days. Computer forensic has four phases: Collection, Presentation, Filtering and presentation. Computer Forensic: It is an art and science of applying computer science to aid the legal process. Computer involvement in crime such as fraud, child pornography and threatening emails. Another situation where computers commonly assist in a crime is intellectual property theft in the corporate environment. Computers were the targets of the crime such as during a Denial of Service (DoS) attack against an E-Commerce site. It is often less obvious than previous cases. Computer contains information that is incidental to the crime such as a database containing the payment and receipts list of gamblers, drug traffickers, and scammers. Pay and receipts (owe) are the documents made in spreadsheets to keep track of their customers and suppliers. In the same cases other innocent bystanders computers, WiFi networks may have hacked to send threatening mail for example mails sent by terrorist group before the bomb Blast in various cities of India.
Appears in Collections:Publications - CO

Files in This Item:
File Description SizeFormat 
Contribution_102.pdf271.65 kBAdobe PDFView/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.