10 research outputs found
ΠΠ½Π΄ΡΡΡΡΠΈΡΠΊΠΈ ΡΠ°ΡΠ±Π΅Ρ Π½Π°ΠΏΠ°Π΄ΠΈ β ΠΠ»ΠΎΠ±Π°Π»Π½Π° Π±Π΅Π·Π±Π΅Π΄Π½ΠΎΡΠ½Π° Π·Π°ΠΊΠ°Π½Π°
Π‘Π°ΡΠ±Π΅Ρ Π½Π°ΠΏΠ°Π΄ΠΈΡΠ΅ Π·Π° ΠΌΠ½ΠΎΠ³Ρ Π±ΡΠ·ΠΎ Π²ΡΠ΅ΠΌΠ΅ ΠΏΡΠ΅ΡΠ°ΡΠ½Π°Π° Π²ΠΎ Π΅Π΄Π½Π° ΠΎΠ΄ Π²ΠΎΠ΄Π΅ΡΠΊΠΈΡΠ΅ Π·Π°ΠΊΠ°Π½ΠΈ Π²ΡΠ· ΠΊΠΎΠΌΠΏΠ»Π΅ΡΠ½ΠΈΠΎΡ Π±Π΅Π·Π±Π΅Π΄Π½ΠΎΡΠ΅Π½ ΡΠΈΡΡΠ΅ΠΌ ΠΊΠ°ΠΊΠΎ Π½Π° Π½Π°ΡΠΈΠΎΠ½Π°Π»Π½ΠΎ, ΡΠ°ΠΊΠ° ΠΈ Π½Π° Π³Π»ΠΎΠ±Π°Π»Π½ΠΎ Π½ΠΈΠ²ΠΎ. ΠΠΎΠ»Π΅ΡΠΎ Π½Π° ΠΈΡΠΊΠΎΡΠΈΡΡΡΠ²Π°ΡΠ΅ Π½Π° ΠΎΠ²ΠΈΠ΅ Π½Π°ΠΏΠ°Π΄ΠΈ ΠΎΠ΄ Π΄Π΅Π½ Π½Π° Π΄Π΅Π½ Π΅ ΡΓ¨ ΠΏΠΎΠ³ΠΎΠ»Π΅ΠΌΠΎ, ΡΡΠΎ Π΅ ΠΏΡΠΈΡΠΈΠ½Π΅ΡΠΎ ΠΏΡΠ΅Π΄ ΡΓ¨ ΠΎΠ΄ ΡΓ¨ ΠΏΠΎΠ³ΠΎΠ»Π΅ΠΌΠ°ΡΠ° ΠΊΠΎΠΌΠΏΡΡΡΠ΅ΡΠΈΠ·ΠΈΡΠ°Π½ΠΎΡΡ Π½Π° ΡΠ΅ΠΊΠΎΡΠ° Π³ΡΠ°Π½ΠΊΠ° Π²ΠΎ ΠΈΠ½Π΄ΡΡΡΡΠΈΡΠ°ΡΠ°.
Π‘Γ¨ ΠΏΠΎΠ³ΠΎΠ»Π΅ΠΌΠ° Π΅ ΡΠ²Π΅ΡΡΠ° ΠΈ ΠΊΠ°Ρ Π½Π°ΡΠΌΠ°Π»ΠΈΡΠ΅ ΠΏΠΎΠ·Π½Π°Π²Π°ΡΠΈ Π½Π° ΠΎΠ²Π°Π° ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ°ΡΠΈΠΊΠ° Π΄Π΅ΠΊΠ° ΡΠ°ΡΠ±Π΅Ρ Π·Π°ΠΊΠ°Π½Π° ΠΌΠΎΠΆΠ΅ Π΄Π° ΠΏΡΠ΅Π΄ΠΈΠ·Π²ΠΈΠΊΠ° ΠΎΠ³ΡΠΎΠΌΠ½ΠΈ ΡΡΠ΅ΡΠΈ ΠΊΠΎΠΈ Π½Π΅ Π±ΠΈ ΡΠ΅ ΡΠ°Π·Π»ΠΈΠΊΡΠ²Π°Π»Π΅ ΠΎΠ΄ ΡΡΠ΅ΡΠΈΡΠ΅ Π½Π°Π½Π΅ΡΠ΅Π½ΠΈ ΡΠΎ Π±ΠΈΠ»ΠΎ ΠΊΠ°ΠΊΠ²Π° Π²ΠΎΠ΅Π½Π° ΠΎΠΏΠ΅ΡΠ°ΡΠΈΡΠ°, Π° ΡΠ°ΡΠ±Π΅Ρ ΠΎΡΡΠΆΡΠ΅ΡΠΎ, Π½Π° ΠΌΠ½ΠΎΠ³Ρ ΠΏΠΎΡΡΠΏΡΠΈΠ»Π΅Π½ Π½Π°ΡΠΈΠ½, ΠΌΠΎΠΆΠ΅ Π΄Π° ΠΎΠ΄Π·Π΅ΠΌΠ΅ ΠΏΠΎΠ²Π΅ΡΠ΅ ΠΆΠΈΠ²ΠΎΡΠΈ ΠΎΠ΄ Π±ΠΈΠ»ΠΎ ΠΊΠ°ΠΊΠΎΠ² ΠΊΠΎΠ½Π²Π΅Π½ΡΠΈΠΎΠ½Π°Π»Π΅Π½ Π½Π°ΠΏΠ°Π΄.
ΠΠ»Π°Π΄ΠΈΡΠ΅ Π½ΠΈΠ· ΡΠ΅Π»ΠΈΠΎΡ ΡΠ²Π΅Ρ, ΠΊΠ°ΠΊΠΎ ΠΈ ΡΠΈΡΠ΅ Π³ΠΎΠ»Π΅ΠΌΠΈ ΡΠ²Π΅ΡΡΠΊΠΈ ΠΎΡΠ³Π°Π½ΠΈΠ·Π°ΡΠΈΠΈ, ΡΠ΅ ΠΏΠΎΠ΄Π³ΠΎΡΠ²ΡΠ²Π°Π°Ρ Π΄Π° ΡΠ΅ ΡΠΏΡΠ°Π²Π°Ρ ΡΠΎ ΠΎΠ²ΠΎΡ ΠΌΠ°ΡΠΈΠ²Π΅Π½ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΡΠΊΠΈ ΠΏΠΎΠ²ΠΈΠΊ Π·Π° Π·Π°ΠΊΠ°Π½ΠΈ ΠΎΠ΄ Π³Π»ΠΎΠ±Π°Π»Π½ΠΈ ΡΠ°Π·ΠΌΠ΅ΡΠΈ. Π‘Π²Π΅ΡΡΠ° Π·Π° Π·Π°ΠΊΠ°Π½Π°ΡΠ° ΠΈ ΡΠΈΠ·ΠΈΡΠΈΡΠ΅ Π΅ Π²ΠΈΡΠΎΠΊΠ°, ΡΡΠΎ ΡΡΠ»ΠΎΠ²ΡΠ²Π°, ΠΈ ΠΏΠΎΠΊΡΠ°Ρ ΠΊΡΠΈΠ·Π½Π°ΡΠ° Π΅ΠΊΠΎΠ½ΠΎΠΌΡΠΊΠ° ΡΠΈΡΡΠ°ΡΠΈΡΠ° Π²ΠΎ ΡΠ²Π΅ΡΡΠΊΠΈ ΡΠ°ΠΌΠΊΠΈ, ΠΈΠ·Π΄Π²ΠΎΡΡΠ²Π°ΡΠ΅ Π½Π° Π³ΠΎΠ»Π΅ΠΌΠ° ΡΡΠΌΠ° Π½Π° ΠΏΠ°ΡΠΈ ΡΠΎ ΡΠ΅Π» ΠΏΠΎΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° Π·Π° ΠΎΠ΄Π³ΠΎΠ²ΠΎΡ Π½Π° Π½ΠΎΠ²ΠΈ Π²ΠΎΠ½ΡΠ΅Π΄Π½ΠΈ ΡΠΎΡΡΠΎΡΠ±ΠΈ ΠΊΠΎΠΈ Π±ΠΈ Π±ΠΈΠ»Π΅ ΠΏΡΠΈΡΠΈΠ½Π΅ΡΠΈ ΠΎΠ΄ Π³Π»ΠΎΠ±Π°Π»Π½ΠΈΡΠ΅ ΡΠ°ΡΠ±Π΅Ρ Π½Π°ΠΏΠ°Π΄ΠΈ.
Π Π°Π±ΠΎΡΠ°ΡΠ° Π²ΠΎ ΠΎΠ²ΠΎΡ ΡΡΡΠ΄ ΡΠ΅ ΡΠΎΠΊΡΡΠΈΡΠ° Π½Π° ΡΠ°ΡΠ±Π΅Ρ Π½Π°ΠΏΠ°Π΄ΠΈΡΠ΅ ΠΊΠ°ΠΊΠΎ Π³Π»ΠΎΠ±Π°Π»Π½Π° Π±Π΅Π·Π±Π΅Π΄Π½ΠΎΡΠ½Π° Π·Π°ΠΊΠ°Π½Π° ΡΠΎ ΠΎΠ³ΡΠΎΠΌΠ½ΠΈ ΠΈΠΌΠΏΠ»ΠΈΠΊΠ°ΡΠΈΠΈ Π½Π΅ ΡΠ°ΠΌΠΎ Π²ΡΠ· ΠΏΠΎΠ΅Π΄ΠΈΠ½ΡΠΈ ΠΈΠ»ΠΈ ΡΠΈΡΡΠ΅ΠΌΠΈΡΠ΅ Π½Π° Π΅Π΄Π½Π° ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΡΠ°, ΡΡΠΊΡ ΠΈ Π²ΡΠ· ΠΊΠΎΠΌΠΏΠ»Π΅ΡΠ½ΠΈΠΎΡ Π±Π΅Π·Π±Π΅Π΄Π½ΠΎΡΠ΅Π½ ΡΠΈΡΡΠ΅ΠΌ Π½Π° Π΅Π΄Π½Π° Π΄ΡΠΆΠ°Π²Π°, ΡΠΎ ΠΌΠΎΠΆΠ½ΠΎΡΡ Π·Π° ΠΏΡΠ΅Π΄ΠΈΠ·Π²ΠΈΠΊΡΠ²Π°ΡΠ΅ Π½Π° ΠΊΡΠΈΠ·ΠΈ ΠΎΠ΄ ΠΌΠ½ΠΎΠ³Ρ ΠΏΠΎΡΠΈΡΠΎΠΊΠΈ ΡΠ°Π·ΠΌΠ΅ΡΠΈ. ΠΠΎΡΠ΅Π±Π΅Π½ Π°ΠΊΡΠ΅Π½Ρ ΡΠ΅ ΡΡΠ°Π²Π° Π²ΡΠ· Π½Π°ΡΠ½ΠΎΠ²ΠΈΡΠ΅ ΠΈΠ½Π΄ΡΡΡΡΠΈΡΠΊΠΈ Π½Π°ΠΏΠ°Π΄ΠΈ, ΠΊΠΎΠΈ ΡΠΏΠΎΡΠ΅Π΄ Π½Π°ΡΠ³ΠΎΠ»Π΅ΠΌ Π±ΡΠΎΡ ΠΈΡΡΡΠ°ΠΆΡΠ²Π°ΡΠ° ΠΎΠ΄ ΡΠ΅Π»Π΅Π²Π°Π½ΡΠ½ΠΈ ΠΎΡΠ³Π°Π½ΠΈΠ·Π°ΡΠΈΠΈ Π²ΠΎ ΠΎΠ²Π°Π° ΠΎΠ±Π»Π°ΡΡ, ΡΠ΅ ΡΡΠ°Π²Π΅Π½ΠΈ ΠΊΠ°ΠΊΠΎ Π½Π°ΡΠ³ΠΎΠ»Π΅ΠΌΠΈ ΠΌΠΎΠΌΠ΅Π½ΡΠ°Π»Π½ΠΈ ΡΠ°ΡΠ±Π΅Ρ Π·Π°ΠΊΠ°Π½ΠΈ ΠΈ ΠΌΠ΅ΡΡ Π½Π°ΡΠ³ΠΎΠ»Π΅ΠΌΠΈΡΠ΅ Π³Π»ΠΎΠ±Π°Π»Π½ΠΈ Π·Π°ΠΊΠ°Π½ΠΈ Π²ΠΎΠΎΠΏΡΡΠΎ
Π‘Π°ΡΠ±Π΅Ρ Π½Π°ΠΏΠ°Π΄ΠΈΡΠ΅ ΠΊΠ°ΠΊΠΎ Π½Π°ΡΡΠΎΠ²ΡΠ΅ΠΌΠ΅Π½ΠΈ Π·Π°ΠΊΠ°Π½ΠΈ Π²ΡΠ· Π²ΠΎΠ΅Π½ΠΈΡΠ΅ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΈ ΠΈ ΠΊΡΠΈΡΠΈΡΠ½Π°ΡΠ° ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΠ°
ΠΠ²ΠΎΡ ΡΡΡΠ΄ ΡΠ΅ ΡΠΎΠΊΡΡΠΈΡΠ° Π½Π° ΡΠ°ΡΠ±Π΅Ρ Π½Π°ΠΏΠ°Π΄ΠΈΡΠ΅ ΠΊΠ°ΠΊΠΎ Π΅Π΄Π½Π° ΠΎΠ΄
Π½Π°ΡΠ³ΠΎΠ»Π΅ΠΌΠΈΡΠ΅ Π·Π°Π³ΡΠΈΠΆΠ΅Π½ΠΎΡΡΠΈ Π²ΠΎ ΡΠ²Π΅ΡΠΎΡ Π½Π° Π³Π»ΠΎΠ±Π°Π»Π½ΠΈΡΠ΅ Π±Π΅Π·Π±Π΅Π΄Π½ΠΎΡΠ½ΠΈ Π·Π°ΠΊΠ°Π½ΠΈ, ΡΠΎ
ΠΌΠΎΠΆΠ½ΠΎΡΡΠΈ Π·Π° ΠΈΠΌΠΏΠ»ΠΈΠΊΠ°ΡΠΈΠΈ Π²ΡΠ· ΡΠΈΡΠ΅ ΡΡΠ΅ΡΠΈ, ΠΏΠΎΡΠ½ΡΠ²Π°ΡΡΠΈ ΠΎΠ΄ ΠΏΠΎΠ΅Π΄ΠΈΠ½ΡΠΈΡΠ΅,
ΠΈΠ½Π΄ΡΡΡΡΠΈΡΠΊΠΈΡΠ΅ ΡΠΈΡΡΠ΅ΠΌΠΈ, Π²Π»Π°Π΄ΠΈΠ½ΠΈΡΠ΅ ΠΈ Π΄ΡΠΆΠ°Π²Π½ΠΈΡΠ΅ ΠΈΠ½ΡΡΠΈΡΡΡΠΈΠΈ, ΠΏΠ° ΡΡ Π΄ΠΎ
Π³ΠΎΠ»Π΅ΠΌΠΈΡΠ΅ ΠΈΠ½ΡΠ΅ΡΠ½Π°ΡΠΈΠΎΠ½Π°Π»Π½ΠΈ ΠΎΡΠ³Π°Π½ΠΈΠ·Π°ΡΠΈΠΈ. Π‘Π°ΡΠ±Π΅Ρ Π½Π°ΠΏΠ°Π΄ΠΈΡΠ΅ Π·Π° ΠΌΠ½ΠΎΠ³Ρ Π±ΡΠ·ΠΎ
Π²ΡΠ΅ΠΌΠ΅ ΠΏΡΠ΅ΡΠ°ΡΠ½Π°Π° Π²ΠΎ Π΅Π΄Π½Π° ΠΎΠ΄ Π²ΠΎΠ΄Π΅ΡΠΊΠΈΡΠ΅ Π·Π°ΠΊΠ°Π½ΠΈ Π²ΡΠ· ΠΊΠΎΠΌΠΏΠ»Π΅ΡΠ½ΠΈΠΎΡ Π±Π΅Π·Π±Π΅Π΄Π½ΠΎΡΠ΅Π½
ΡΠΈΡΡΠ΅ΠΌ ΠΊΠ°ΠΊΠΎ Π½Π° Π½Π°ΡΠΈΠΎΠ½Π°Π»Π½ΠΎ, ΡΠ°ΠΊΠ° ΠΈ Π½Π° Π³Π»ΠΎΠ±Π°Π»Π½ΠΎ Π½ΠΈΠ²ΠΎ. Π‘Γ¨ ΠΏΠΎΠ³ΠΎΠ»Π΅ΠΌΠ° Π΅ ΡΠ²Π΅ΡΡΠ° ΠΈ
ΠΊΠ°Ρ Π½Π°ΡΠΌΠ°Π»ΠΈΡΠ΅ ΠΏΠΎΠ·Π½Π°Π²Π°ΡΠΈ Π½Π° ΠΎΠ²Π°Π° ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ°ΡΠΈΠΊΠ° Π΄Π΅ΠΊΠ° ΡΠ°ΡΠ±Π΅Ρ Π·Π°ΠΊΠ°Π½Π° ΠΌΠΎΠΆΠ΅ Π΄Π°
ΠΏΡΠ΅Π΄ΠΈΠ·Π²ΠΈΠΊΠ° ΠΎΠ³ΡΠΎΠΌΠ½ΠΈ ΡΡΠ΅ΡΠΈ ΠΊΠΎΠΈ Π½Π΅ Π±ΠΈ ΡΠ΅ ΡΠ°Π·Π»ΠΈΠΊΡΠ²Π°Π»Π΅ ΠΎΠ΄ ΡΡΠ΅ΡΠΈΡΠ΅ Π½Π°Π½Π΅ΡΠ΅Π½ΠΈ ΡΠΎ
Π±ΠΈΠ»ΠΎ ΠΊΠ°ΠΊΠ²Π° Π²ΠΎΠ΅Π½Π° ΠΎΠΏΠ΅ΡΠ°ΡΠΈΡΠ°, Π° ΡΠ°ΡΠ±Π΅Ρ ΠΎΡΡΠΆΡΠ΅ΡΠΎ, Π½Π° ΠΌΠ½ΠΎΠ³Ρ ΠΏΠΎΡΡΠΏΡΠΈΠ»Π΅Π½ Π½Π°ΡΠΈΠ½,
ΠΌΠΎΠΆΠ΅ Π΄Π° ΠΎΠ΄Π·Π΅ΠΌΠ΅ ΠΏΠΎΠ²Π΅ΡΠ΅ ΠΆΠΈΠ²ΠΎΡΠΈ ΠΎΠ΄ Π±ΠΈΠ»ΠΎ ΠΊΠ°ΠΊΠΎΠ² ΠΊΠΎΠ½Π²Π΅Π½ΡΠΈΠΎΠ½Π°Π»Π΅Π½ Π½Π°ΠΏΠ°Π΄.
ΠΠ»Π°Π΄ΠΈΡΠ΅ Π½ΠΈΠ· ΡΠ΅Π»ΠΈΠΎΡ ΡΠ²Π΅Ρ, ΠΊΠ°ΠΊΠΎ ΠΈ ΡΠΈΡΠ΅ Π³ΠΎΠ»Π΅ΠΌΠΈ ΡΠ²Π΅ΡΡΠΊΠΈ ΠΎΡΠ³Π°Π½ΠΈΠ·Π°ΡΠΈΠΈ, ΡΠ΅
ΠΏΠΎΠ΄Π³ΠΎΡΠ²ΡΠ²Π°Π°Ρ Π΄Π° ΡΠ΅ ΡΠΏΡΠ°Π²Π°Ρ ΡΠΎ ΠΎΠ²ΠΎΡ ΠΌΠ°ΡΠΈΠ²Π΅Π½ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΡΠΊΠΈ ΠΏΠΎΠ²ΠΈΠΊ Π·Π° Π·Π°ΠΊΠ°Π½ΠΈ ΠΎΠ΄
Π³Π»ΠΎΠ±Π°Π»Π½ΠΈ ΡΠ°Π·ΠΌΠ΅ΡΠΈ. Π‘Π²Π΅ΡΡΠ° Π·Π° Π·Π°ΠΊΠ°Π½Π°ΡΠ° ΠΈ ΡΠΈΠ·ΠΈΡΠΈΡΠ΅ Π΅ Π²ΠΈΡΠΎΠΊΠ°, ΡΡΠΎ ΡΡΠ»ΠΎΠ²ΡΠ²Π°, ΠΈ
ΠΏΠΎΠΊΡΠ°Ρ ΠΊΡΠΈΠ·Π½Π°ΡΠ° Π΅ΠΊΠΎΠ½ΠΎΠΌΡΠΊΠ° ΡΠΈΡΡΠ°ΡΠΈΡΠ° Π²ΠΎ ΡΠ²Π΅ΡΡΠΊΠΈ ΡΠ°ΠΌΠΊΠΈ, ΠΈΠ·Π΄Π²ΠΎΡΡΠ²Π°ΡΠ΅ Π½Π°
Π³ΠΎΠ»Π΅ΠΌΠΈ ΡΠΈΠ½Π°Π½ΡΠΈΡΠΊΠΈ ΡΡΠ΅Π΄ΡΡΠ²Π° ΡΠΎ ΡΠ΅Π» ΠΏΠΎΠ΄Π³ΠΎΡΠΎΠ²ΠΊΠ° Π·Π° ΠΎΠ΄Π³ΠΎΠ²ΠΎΡ Π½Π° Π½ΠΎΠ²ΠΈ Π²ΠΎΠ½ΡΠ΅Π΄Π½ΠΈ
ΡΠΎΡΡΠΎΡΠ±ΠΈ ΠΊΠΎΠΈ Π±ΠΈ Π±ΠΈΠ»Π΅ ΠΏΡΠΈΡΠΈΠ½Π΅ΡΠΈ ΠΎΠ΄ Π³Π»ΠΎΠ±Π°Π»Π½ΠΈΡΠ΅ ΡΠ°ΡΠ±Π΅Ρ Π½Π°ΠΏΠ°Π΄ΠΈ
A novel approach for mitigating the effects of the TCP SYN flood DDoS attacks
Todayβs modern society greatly depends on computer systems. Security is a basic need for any computer system. This is more than acceptable if we consider that any disruption of the normal function of the computer and networks may lead to catastrophic consequences. The most frequently attacks conducting malicious activities against the networks and systems are the Distributed Denial of Service (DDoS) attacks. The paper concerns the TCP (Transmission Control Protocol) vulnerability that gives space for a type of DoS (Denial of Service) attack called TCP-SYN Flood DDoS attack which is well-known to the community for several years. It explains in more detail the TCP SYN Flood DDoS attacks and methods for preventing and mitigating the effects of these attacks. Furthermore, the paper proposes a novel method consisting of five modules which can be used for mitigation and protection against the considered TCP SYN Flood attack, as well as against other similar flooding based attacks
Computer Incidents Analysis based on Live Response Script
In the course of providing electronic evidence a number of commercial tools are used. The users of this tolls very often are not able to explain the way they are operating and the manner in which the report is generated. There is an increased need for developing and using of scripts and programs which can be used to provide information from information systems which are not switched off. At the same time the examiners must be able to explain the script functionality and generated result and information. In this paper we are presenting a developed script which can be used to perform a live forensics analysis used to analyze volatile data
Steganography in Support of the Global Terrorism
The way of conducting terrorism with the time is becoming more sophisticated. Namely, there are eight different ways in which contemporary terrorists use the Internet, ranging from psychological warfare and propaganda to highly instrumental uses such as fundraising, recruitment, data mining, and coordination of actions. Coordination of the terrorist activity is key for their success. However coordination of their global activity is going through global network controlled and often monitored by ISPs (Internet Service Providers), LEAs (Law Enforcement Agencies), and different security and intelligence agencies. The terrorists are aware that the messages sent to their perpetrators through the Internet can be intercepted very easily and thus their intentions can be detected. Therefore, they are using different methods to protect their information. The two most used techniques of information protection are cryptography and information hiding. This chapter will cover only one of the mentioned techniques which deals with information hiding, or more specific it will cover different steganography techniques and tools. It will give short review of several different steganographic tools. Furthermore, it will explain specific usage of some of these tools. The chapter also tends to explain the different steganalysis techniques that are striking a significant blow not only to the terrorist organizations, but also on any other individual or group that use steganographic techniques as a way for covert transmission of their malicious intents. The chapter will show not only practical usage of some specific steganalysis tools but also usage of some tools whose basic function are not connected with this technique but can give significant contribution in steganalysis process and determining the existence of hidden objects.
$35.00 / β¬27.50 / Β£22.00
Add PDF to car
Cyber operations - a permanent part of the global conflict
It is more than obvious that the way of conducting operations with the time are becoming more sophisticated. The cyber operations through the most severe threats known as cyber attacks and cyber terrorism are major challenges to the fast technology development. Potential targets are systems which control the nationβs defences and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast grown of the Internet users and Internet dependence dramatically increased the security risks, unless there are appropriate security measures to help prevention. This book helps to understand the cyber operations conducted by terrorist organizations looking at their background, and seeing how these organizations or individuals are using the advantage of the new technology. Furthermore, the book explains the measures governments and multinational organizations are taking to help the fight against cyber terrorism
Novel First Responder Script as a Tool for Computer Forensics
The computer forensics as a branch of digital forensic pertaining to legal evidence found in computers and digital storage media. In order forensic acquisition to be more reliable it must be performed on computers that have been powered off. This type of forensics is known as βtraditionalβ or 'dead' forensic acquisition. However, this type of forensic cannot be used to collect and analyze the information which is not on the hard disk, or encrypted data. The disadvantages of the dead forensics can be overcome handling a live forensics acquisition process. There are many commercial and freeware tools which can be used to provide information based on live forensics acquisition. The problem with this tools is that in many cases the examiner cannot explain the script functionality and generated results and information. Because of this reason there is a increased need for developing and using script which can be easy explained and adapted to any analysis which should be made by the examiners. The paper presents a developed First Responder script which can be used to perform a live forensics analysis
ΠΡΠΈΠΎΠ»ΠΎΠ³ΠΈΡΠ° Π½Π° ΡΠ΅ΠΌΠ΅ΡΠ½ΠΎΡΠΎ Π½Π°ΡΠΈΠ»ΡΡΠ²ΠΎ
ΠΠΏΡΡΡΠ°ΠΊΡ: ΠΠ°ΡΠΈΠ»ΡΡΠ²ΠΎΡΠΎ Π²ΠΎ ΡΠ΅ΠΌΠ΅ΡΡΡΠ²ΠΎΡΠΎ ΠΏΡΠ΅ΡΡΡΠ°Π²ΡΠ²Π° ΡΠ»ΠΎΠΆΠ΅Π½ ΠΊΡΠΈΠΌΠΈΠ½ΠΎΠ»ΠΎΡΠΊΠΈ, ΡΠΎΡΠΈΠΎΠ»ΠΎΡΠΊΠΈ, Π²ΠΈΠΊΡΠΈΠΌΠΎΠ»ΠΎΡΠΊΠΈ ΠΈ ΠΊΡΠΈΠ²ΠΈΡΠ½ΠΎΠΏΡΠ°Π²Π΅Π½ ΠΏΡΠ΅Π΄ΠΈΠ·Π²ΠΈΠΊ Π½Π° ΡΠΎΠ²ΡΠ΅ΠΌΠ΅Π½ΠΎΡΠΎ ΠΎΠΏΡΡΠ΅ΡΡΠ²ΠΎ. ΠΠΈΡΠΎΠΊΠ°ΡΠ° Π·Π°ΡΠ΅ΡΡΠ΅Π½ΠΎΡΡ, ΡΠ΅ΡΠΈΠΎΠ·Π½ΠΈΡΠ΅ ΠΏΠΎΡΠ»Π΅Π΄ΠΈΡΠΈ, ΠΊΠ°ΠΊΠΎ Π½Π° Π½Π΅ΠΏΠΎΡΡΠ΅Π΄Π½ΠΈΡΠ΅, ΡΠ°ΠΊΠ° ΠΈ Π½Π° ΠΏΠΎΡΡΠ΅Π΄Π½ΠΈΡΠ΅ ΠΆΡΡΠ²ΠΈ, ΡΠ΅ΡΠΊΠΎΡΠΈΠΈΡΠ΅ ΠΏΡΠΈ ΠΎΡΠΊΡΠΈΠ²Π°ΡΠ΅ΡΠΎ ΠΈ ΠΏΡΠΎΡΠ΅ΡΡΠΈΡΠ°ΡΠ΅ΡΠΎ Π½Π° ΡΡΠΎΡΠΈΡΠ΅Π»ΠΈΡΠ΅, ΠΏΡΠ°Π²Π°Ρ Π΄Π° ΠΎΠ²Π°Π° ΠΏΠΎΡΠ°Π²Π° Π±Π°ΡΠ° Π½Π΅ΠΎΠ΄Π»ΠΎΠΆΠ½Π° ΠΎΠΏΡΡΠ΅ΡΡΠ²Π΅Π½Π° ΡΠ΅ΠΊΠ°ΡΠΈΡΠ°.
Π‘Π°ΠΌΠ°ΡΠ° ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ°ΡΠΈΠΊΠ° Π½Π° Π½Π°ΡΠΈΠ»ΡΡΠ²ΠΎΡΠΎ Π²ΠΎ ΡΠ΅ΠΌΠ΅ΡΡΡΠ²ΠΎΡΠΎ ΡΠΏΠ°ΡΡΠ²Π° Π½Π° ΠΊΠΎΠΌΠΏΠ»Π΅ΠΊΡΠ½ΠΎΡΡΠ° ΠΈ ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠ°, ΠΈ ΠΏΠΎΡΡΠ΅Π±Π°ΡΠ° Π½Π° ΠΈΠ½ΡΠ΅ΡΠ΄ΠΈΡΡΠΈΠΏΠ»ΠΈΠ½Π°ΡΠ½ΠΎ ΠΏΡΠΎΡΡΡΠ²Π°ΡΠ΅ ΠΈ Π΄Π΅ΡΡΡΠ²ΡΠ²Π°ΡΠ΅ Π½Π° ΠΏΡΠ΅Π²Π΅Π½ΡΠΈΠ²Π΅Π½ ΠΈ ΡΠ΅ΠΏΡΠ΅ΡΠΈΠ²Π΅Π½ ΠΏΠ»Π°Π½. Π‘Π΅ΠΌΠ΅ΡΠ½ΠΎΡΠΎ Π½Π°ΡΠΈΠ»ΡΡΠ²ΠΎ Π΅ ΡΠ»ΠΎΠΆΠ΅Π½Π° ΠΈ ΠΏΠΎΠ²Π΅ΡΠ΅ΡΡΠ΅ΠΏΠ΅Π½Π° ΡΡΠ»ΠΎΠ²Π΅Π½Π° ΠΏΠΎΡΠ°Π²Π° ΠΊΠΎΡΠ° ΡΠ΅ ΡΠ°Π·Π²ΠΈΠ²Π° Π½Π° ΡΠ°Π·Π»ΠΈΡΠ½ΠΈ Π½Π°ΡΠΈΠ½ΠΈ ΠΈ ΠΈΠΌΠ° ΡΠ°Π·Π»ΠΈΡΠ½ΠΈ ΠΎΠ±Π΅Π»Π΅ΠΆΡΠ°. Π‘ΠΎ Π΄ΠΎΠ±ΡΠΎ ΠΎΡΠ³Π°Π½ΠΈΠ·ΠΈΡΠ°ΡΠ΅ Π½Π° ΡΠΈΡΠ΅ ΡΠ΅Π»Π΅Π²Π°Π½ΡΠ½ΠΈ ΠΎΠΏΡΡΠ΅ΡΡΠ²Π΅Π½ΠΈ ΡΠ°ΠΊΡΠΎΡΠΈ ΠΈ Π½ΠΈΠ²Π½ΠΈ ΠΏΡΠΈΡΡΠ°ΠΏ Π²ΠΎ ΡΠ΅ΡΠ°Π²Π°ΡΠ΅ΡΠΎ Π½Π° ΠΎΠ²ΠΎΡ ΡΠ»ΠΎΠΆΠ΅Π½ ΠΈ ΡΠ΅ΡΠΊΠΎ Π²ΠΎΠΎΡΠ»ΠΈΠ² ΠΏΡΠΎΠ±Π»Π΅ΠΌ Π±ΠΈ ΡΠ΅ Π½Π°ΠΌΠ°Π»ΠΈΠ»Π° ΠΏΠΎΡΠ°Π²Π½ΠΎΡΡΠ° Π½Π° Π½Π°ΡΠΈΠ»ΡΡΠ²ΠΎΡΠΎ Π²ΠΎ ΡΠ΅ΠΌΠ΅ΡΡΡΠ²ΠΎΡΠΎ.
ΠΠ»ΡΡΠ½ΠΈ Π·Π±ΠΎΡΠΎΠ²ΠΈ: ΡΠ΅ΠΌΠ΅ΡΡΡΠ²ΠΎ, ΡΠ΅ΠΌΠ΅ΡΠ½ΠΈ ΡΠ°ΠΊΡΠΎΡΠΈ, Π½Π°ΡΠΈΠ»ΡΡΠ²ΠΎ, ΡΠ΅ΠΌΠ΅ΡΠ½ΠΎ Π½Π°ΡΠΈΠ»ΡΡΠ²
Novel First Responder Digital Forensics Tool as a Support to Law Enforcement
There are many freeware and commercial tools which can be used to provide forensics information based on dead and live forensics acquisition. The main problem with these tools is that in many cases the investigator cannot explain the script functionality and generated results and information during the trial. Because of this reason there is an increased need for developing and using script which can be easy explained and adapted to any analysis which should be made by the examiners. The chapter presents a novel developed First Responder script which can be used to perform a live and dead forensics analysis in support of Law Enforcement during the investigation process
Cyber security issues of telecommunication infrastructure
We live in a well connected and technology dependent world. People, institutions, companies have increasing need for communication in everyday life. Global and seamless connectivity today is enabled by complex telecommunications infrastructure consisted of a large variety of different technologies which are in a continuous process of development and innovations. But, the global connectivity and easy access to modern technology also enables malicious users and their activities. These activities might be of different nature: starting from passive monitoring to destructive attacks disabling the normal operation of ICT (information and communication technology) infrastructure. Therefore, security issues of telecommunication infrastructure must be thoroughly addressed by all relevant stakeholders. Although each technology includes certain security mechanisms, it is necessary to create well designed security concept for the infrastructure as a whole, taking into consideration not only the technical issues, but also policy framework and legal aspects. The concept must be a subject of constant revision in order to be up to date to current threats. Therefore, the network infrastructure must be always monitored and analyzed, in order to create efficient measures against the security threats. The telecommunication infrastructure in the Republic of Macedonia is owned and operated by state institutions, telecom operators and providers, other companies and universities etc. All of them are faced with number of malicious activities and attacks exploiting vulnerabilities of the systems, which are well monitored and statistically analyzed. Also, all of them has defined more or less effective security concept including proactive and reactive measures. However, a common practice of cooperation and exchange of information and experience among the subjects is missing. A national strategy and policy framework are also missing. Their creation and devoted implementation would be beneficial for all stakeholders resulting in more effective and less expensive solutions as a response to cyber attack