10 research outputs found

    Π˜Π½Π΄ΡƒΡΡ‚Ρ€ΠΈΡΠΊΠΈ ΡΠ°Ρ˜Π±Π΅Ρ€ Π½Π°ΠΏΠ°Π΄ΠΈ – Π“Π»ΠΎΠ±Π°Π»Π½Π° бСзбСдносна Π·Π°ΠΊΠ°Π½Π°

    Get PDF
    Π‘Π°Ρ˜Π±Π΅Ρ€ Π½Π°ΠΏΠ°Π΄ΠΈΡ‚Π΅ Π·Π° ΠΌΠ½ΠΎΠ³Ρƒ Π±Ρ€Π·ΠΎ Π²Ρ€Π΅ΠΌΠ΅ прСраснаа Π²ΠΎ Π΅Π΄Π½Π° ΠΎΠ΄ Π²ΠΎΠ΄Π΅Ρ‡ΠΊΠΈΡ‚Π΅ Π·Π°ΠΊΠ°Π½ΠΈ Π²Ρ€Π· ΠΊΠΎΠΌΠΏΠ»Π΅Ρ‚Π½ΠΈΠΎΡ‚ бСзбСдносСн систСм ΠΊΠ°ΠΊΠΎ Π½Π° Π½Π°Ρ†ΠΈΠΎΠ½Π°Π»Π½ΠΎ, Ρ‚Π°ΠΊΠ° ΠΈ Π½Π° Π³Π»ΠΎΠ±Π°Π»Π½ΠΎ Π½ΠΈΠ²ΠΎ. ΠŸΠΎΠ»Π΅Ρ‚ΠΎ Π½Π° ΠΈΡΠΊΠΎΡ€ΠΈΡΡ‚ΡƒΠ²Π°ΡšΠ΅ Π½Π° ΠΎΠ²ΠΈΠ΅ Π½Π°ΠΏΠ°Π΄ΠΈ ΠΎΠ΄ Π΄Π΅Π½ Π½Π° Π΄Π΅Π½ Π΅ сè ΠΏΠΎΠ³ΠΎΠ»Π΅ΠΌΠΎ, ΡˆΡ‚ΠΎ Π΅ ΠΏΡ€ΠΈΡ‡ΠΈΠ½Π΅Ρ‚ΠΎ ΠΏΡ€Π΅Π΄ сè ΠΎΠ΄ сè ΠΏΠΎΠ³ΠΎΠ»Π΅ΠΌΠ°Ρ‚Π° ΠΊΠΎΠΌΠΏΡ˜ΡƒΡ‚Π΅Ρ€ΠΈΠ·ΠΈΡ€Π°Π½ΠΎΡΡ‚ Π½Π° сСкоја Π³Ρ€Π°Π½ΠΊΠ° Π²ΠΎ ΠΈΠ½Π΄ΡƒΡΡ‚Ρ€ΠΈΡ˜Π°Ρ‚Π°. Π‘Γ¨ ΠΏΠΎΠ³ΠΎΠ»Π΅ΠΌΠ° Π΅ свСста ΠΈ кај Π½Π°Ρ˜ΠΌΠ°Π»ΠΈΡ‚Π΅ ΠΏΠΎΠ·Π½Π°Π²Π°Ρ‡ΠΈ Π½Π° ΠΎΠ²Π°Π° ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΠ°Ρ‚ΠΈΠΊΠ° Π΄Π΅ΠΊΠ° ΡΠ°Ρ˜Π±Π΅Ρ€ Π·Π°ΠΊΠ°Π½Π° ΠΌΠΎΠΆΠ΅ Π΄Π° ΠΏΡ€Π΅Π΄ΠΈΠ·Π²ΠΈΠΊΠ° ΠΎΠ³Ρ€ΠΎΠΌΠ½ΠΈ ΡˆΡ‚Π΅Ρ‚ΠΈ ΠΊΠΎΠΈ Π½Π΅ Π±ΠΈ сС Ρ€Π°Π·Π»ΠΈΠΊΡƒΠ²Π°Π»Π΅ ΠΎΠ΄ ΡˆΡ‚Π΅Ρ‚ΠΈΡ‚Π΅ нанСсСни со Π±ΠΈΠ»ΠΎ ΠΊΠ°ΠΊΠ²Π° Π²ΠΎΠ΅Π½Π° ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΡ˜Π°, Π° ΡΠ°Ρ˜Π±Π΅Ρ€ ΠΎΡ€ΡƒΠΆΡ˜Π΅Ρ‚ΠΎ, Π½Π° ΠΌΠ½ΠΎΠ³Ρƒ посуптилСн Π½Π°Ρ‡ΠΈΠ½, ΠΌΠΎΠΆΠ΅ Π΄Π° ΠΎΠ΄Π·Π΅ΠΌΠ΅ повСќС ΠΆΠΈΠ²ΠΎΡ‚ΠΈ ΠΎΠ΄ Π±ΠΈΠ»ΠΎ ΠΊΠ°ΠΊΠΎΠ² ΠΊΠΎΠ½Π²Π΅Π½Ρ†ΠΈΠΎΠ½Π°Π»Π΅Π½ Π½Π°ΠΏΠ°Π΄. Π’Π»Π°Π΄ΠΈΡ‚Π΅ Π½ΠΈΠ· Ρ†Π΅Π»ΠΈΠΎΡ‚ свСт, ΠΊΠ°ΠΊΠΎ ΠΈ ситС Π³ΠΎΠ»Π΅ΠΌΠΈ свСтски ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ, сС ΠΏΠΎΠ΄Π³ΠΎΡ‚Π²ΡƒΠ²Π°Π°Ρ‚ Π΄Π° сС справат со овој масивСн Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΡˆΠΊΠΈ ΠΏΠΎΠ²ΠΈΠΊ Π·Π° Π·Π°ΠΊΠ°Π½ΠΈ ΠΎΠ΄ Π³Π»ΠΎΠ±Π°Π»Π½ΠΈ Ρ€Π°Π·ΠΌΠ΅Ρ€ΠΈ. БвСста Π·Π° Π·Π°ΠΊΠ°Π½Π°Ρ‚Π° ΠΈ Ρ€ΠΈΠ·ΠΈΡ†ΠΈΡ‚Π΅ Π΅ висока, ΡˆΡ‚ΠΎ условува, ΠΈ ΠΏΠΎΠΊΡ€Π°Ρ˜ ΠΊΡ€ΠΈΠ·Π½Π°Ρ‚Π° Скономска ΡΠΈΡ‚ΡƒΠ°Ρ†ΠΈΡ˜Π° Π²ΠΎ свСтски Ρ€Π°ΠΌΠΊΠΈ, ΠΈΠ·Π΄Π²ΠΎΡ˜ΡƒΠ²Π°ΡšΠ΅ Π½Π° Π³ΠΎΠ»Π΅ΠΌΠ° сума Π½Π° ΠΏΠ°Ρ€ΠΈ со Ρ†Π΅Π» ΠΏΠΎΠ΄Π³ΠΎΡ‚ΠΎΠ²ΠΊΠ° Π·Π° ΠΎΠ΄Π³ΠΎΠ²ΠΎΡ€ Π½Π° Π½ΠΎΠ²ΠΈ Π²ΠΎΠ½Ρ€Π΅Π΄Π½ΠΈ ΡΠΎΡΡ‚ΠΎΡ˜Π±ΠΈ ΠΊΠΎΠΈ Π±ΠΈ Π±ΠΈΠ»Π΅ ΠΏΡ€ΠΈΡ‡ΠΈΠ½Π΅Ρ‚ΠΈ ΠΎΠ΄ Π³Π»ΠΎΠ±Π°Π»Π½ΠΈΡ‚Π΅ ΡΠ°Ρ˜Π±Π΅Ρ€ Π½Π°ΠΏΠ°Π΄ΠΈ. Π Π°Π±ΠΎΡ‚Π°Ρ‚Π° Π²ΠΎ овој Ρ‚Ρ€ΡƒΠ΄ сС фокусира Π½Π° ΡΠ°Ρ˜Π±Π΅Ρ€ Π½Π°ΠΏΠ°Π΄ΠΈΡ‚Π΅ ΠΊΠ°ΠΊΠΎ Π³Π»ΠΎΠ±Π°Π»Π½Π° бСзбСдносна Π·Π°ΠΊΠ°Π½Π° со ΠΎΠ³Ρ€ΠΎΠΌΠ½ΠΈ ΠΈΠΌΠΏΠ»ΠΈΠΊΠ°Ρ†ΠΈΠΈ Π½Π΅ само Π²Ρ€Π· ΠΏΠΎΠ΅Π΄ΠΈΠ½Ρ†ΠΈ ΠΈΠ»ΠΈ систСмитС Π½Π° Π΅Π΄Π½Π° компанија, Ρ‚ΡƒΠΊΡƒ ΠΈ Π²Ρ€Π· ΠΊΠΎΠΌΠΏΠ»Π΅Ρ‚Π½ΠΈΠΎΡ‚ бСзбСдносСн систСм Π½Π° Π΅Π΄Π½Π° Π΄Ρ€ΠΆΠ°Π²Π°, со моТност Π·Π° ΠΏΡ€Π΅Π΄ΠΈΠ·Π²ΠΈΠΊΡƒΠ²Π°ΡšΠ΅ Π½Π° ΠΊΡ€ΠΈΠ·ΠΈ ΠΎΠ΄ ΠΌΠ½ΠΎΠ³Ρƒ ΠΏΠΎΡˆΠΈΡ€ΠΎΠΊΠΈ Ρ€Π°Π·ΠΌΠ΅Ρ€ΠΈ. ПосСбСн Π°ΠΊΡ†Π΅Π½Ρ‚ сС става Π²Ρ€Π· Π½Π°Ρ˜Π½ΠΎΠ²ΠΈΡ‚Π΅ индустриски Π½Π°ΠΏΠ°Π΄ΠΈ, ΠΊΠΎΠΈ спорСд најголСм Π±Ρ€ΠΎΡ˜ ΠΈΡΡ‚Ρ€Π°ΠΆΡƒΠ²Π°ΡšΠ° ΠΎΠ΄ Ρ€Π΅Π»Π΅Π²Π°Π½Ρ‚Π½ΠΈ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ Π²ΠΎ ΠΎΠ²Π°Π° област, сС ставСни ΠΊΠ°ΠΊΠΎ најголСми ΠΌΠΎΠΌΠ΅Π½Ρ‚Π°Π»Π½ΠΈ ΡΠ°Ρ˜Π±Π΅Ρ€ Π·Π°ΠΊΠ°Π½ΠΈ ΠΈ ΠΌΠ΅Ρ“Ρƒ Π½Π°Ρ˜Π³ΠΎΠ»Π΅ΠΌΠΈΡ‚Π΅ Π³Π»ΠΎΠ±Π°Π»Π½ΠΈ Π·Π°ΠΊΠ°Π½ΠΈ Π²ΠΎΠΎΠΏΡˆΡ‚ΠΎ

    Π‘Π°Ρ˜Π±Π΅Ρ€ Π½Π°ΠΏΠ°Π΄ΠΈΡ‚Π΅ ΠΊΠ°ΠΊΠΎ Π½Π°Ρ˜ΡΠΎΠ²Ρ€Π΅ΠΌΠ΅Π½ΠΈ Π·Π°ΠΊΠ°Π½ΠΈ Π²Ρ€Π· Π²ΠΎΠ΅Π½ΠΈΡ‚Π΅ ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΈ ΠΈ ΠΊΡ€ΠΈΡ‚ΠΈΡ‡Π½Π°Ρ‚Π° инфраструктура

    Get PDF
    Овој Ρ‚Ρ€ΡƒΠ΄ сС фокусира Π½Π° ΡΠ°Ρ˜Π±Π΅Ρ€ Π½Π°ΠΏΠ°Π΄ΠΈΡ‚Π΅ ΠΊΠ°ΠΊΠΎ Π΅Π΄Π½Π° ΠΎΠ΄ Π½Π°Ρ˜Π³ΠΎΠ»Π΅ΠΌΠΈΡ‚Π΅ загриТСности Π²ΠΎ свСтот Π½Π° Π³Π»ΠΎΠ±Π°Π»Π½ΠΈΡ‚Π΅ бСзбСдносни Π·Π°ΠΊΠ°Π½ΠΈ, со моТности Π·Π° ΠΈΠΌΠΏΠ»ΠΈΠΊΠ°Ρ†ΠΈΠΈ Π²Ρ€Π· ситС сфСри, ΠΏΠΎΡ‡Π½ΡƒΠ²Π°Ρ˜ΡœΠΈ ΠΎΠ΄ ΠΏΠΎΠ΅Π΄ΠΈΠ½Ρ†ΠΈΡ‚Π΅, индустрискитС систСми, Π²Π»Π°Π΄ΠΈΠ½ΠΈΡ‚Π΅ ΠΈ Π΄Ρ€ΠΆΠ°Π²Π½ΠΈΡ‚Π΅ институции, ΠΏΠ° сѐ Π΄ΠΎ Π³ΠΎΠ»Π΅ΠΌΠΈΡ‚Π΅ ΠΈΠ½Ρ‚Π΅Ρ€Π½Π°Ρ‚ΠΈΠΎΠ½Π°Π»Π½ΠΈ ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ. Π‘Π°Ρ˜Π±Π΅Ρ€ Π½Π°ΠΏΠ°Π΄ΠΈΡ‚Π΅ Π·Π° ΠΌΠ½ΠΎΠ³Ρƒ Π±Ρ€Π·ΠΎ Π²Ρ€Π΅ΠΌΠ΅ прСраснаа Π²ΠΎ Π΅Π΄Π½Π° ΠΎΠ΄ Π²ΠΎΠ΄Π΅Ρ‡ΠΊΠΈΡ‚Π΅ Π·Π°ΠΊΠ°Π½ΠΈ Π²Ρ€Π· ΠΊΠΎΠΌΠΏΠ»Π΅Ρ‚Π½ΠΈΠΎΡ‚ бСзбСдносСн систСм ΠΊΠ°ΠΊΠΎ Π½Π° Π½Π°Ρ†ΠΈΠΎΠ½Π°Π»Π½ΠΎ, Ρ‚Π°ΠΊΠ° ΠΈ Π½Π° Π³Π»ΠΎΠ±Π°Π»Π½ΠΎ Π½ΠΈΠ²ΠΎ. Π‘Γ¨ ΠΏΠΎΠ³ΠΎΠ»Π΅ΠΌΠ° Π΅ свСста ΠΈ кај Π½Π°Ρ˜ΠΌΠ°Π»ΠΈΡ‚Π΅ ΠΏΠΎΠ·Π½Π°Π²Π°Ρ‡ΠΈ Π½Π° ΠΎΠ²Π°Π° ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΠ°Ρ‚ΠΈΠΊΠ° Π΄Π΅ΠΊΠ° ΡΠ°Ρ˜Π±Π΅Ρ€ Π·Π°ΠΊΠ°Π½Π° ΠΌΠΎΠΆΠ΅ Π΄Π° ΠΏΡ€Π΅Π΄ΠΈΠ·Π²ΠΈΠΊΠ° ΠΎΠ³Ρ€ΠΎΠΌΠ½ΠΈ ΡˆΡ‚Π΅Ρ‚ΠΈ ΠΊΠΎΠΈ Π½Π΅ Π±ΠΈ сС Ρ€Π°Π·Π»ΠΈΠΊΡƒΠ²Π°Π»Π΅ ΠΎΠ΄ ΡˆΡ‚Π΅Ρ‚ΠΈΡ‚Π΅ нанСсСни со Π±ΠΈΠ»ΠΎ ΠΊΠ°ΠΊΠ²Π° Π²ΠΎΠ΅Π½Π° ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΡ˜Π°, Π° ΡΠ°Ρ˜Π±Π΅Ρ€ ΠΎΡ€ΡƒΠΆΡ˜Π΅Ρ‚ΠΎ, Π½Π° ΠΌΠ½ΠΎΠ³Ρƒ посуптилСн Π½Π°Ρ‡ΠΈΠ½, ΠΌΠΎΠΆΠ΅ Π΄Π° ΠΎΠ΄Π·Π΅ΠΌΠ΅ повСќС ΠΆΠΈΠ²ΠΎΡ‚ΠΈ ΠΎΠ΄ Π±ΠΈΠ»ΠΎ ΠΊΠ°ΠΊΠΎΠ² ΠΊΠΎΠ½Π²Π΅Π½Ρ†ΠΈΠΎΠ½Π°Π»Π΅Π½ Π½Π°ΠΏΠ°Π΄. Π’Π»Π°Π΄ΠΈΡ‚Π΅ Π½ΠΈΠ· Ρ†Π΅Π»ΠΈΠΎΡ‚ свСт, ΠΊΠ°ΠΊΠΎ ΠΈ ситС Π³ΠΎΠ»Π΅ΠΌΠΈ свСтски ΠΎΡ€Π³Π°Π½ΠΈΠ·Π°Ρ†ΠΈΠΈ, сС ΠΏΠΎΠ΄Π³ΠΎΡ‚Π²ΡƒΠ²Π°Π°Ρ‚ Π΄Π° сС справат со овој масивСн Ρ‚Π΅Ρ…Π½ΠΎΠ»ΠΎΡˆΠΊΠΈ ΠΏΠΎΠ²ΠΈΠΊ Π·Π° Π·Π°ΠΊΠ°Π½ΠΈ ΠΎΠ΄ Π³Π»ΠΎΠ±Π°Π»Π½ΠΈ Ρ€Π°Π·ΠΌΠ΅Ρ€ΠΈ. БвСста Π·Π° Π·Π°ΠΊΠ°Π½Π°Ρ‚Π° ΠΈ Ρ€ΠΈΠ·ΠΈΡ†ΠΈΡ‚Π΅ Π΅ висока, ΡˆΡ‚ΠΎ условува, ΠΈ ΠΏΠΎΠΊΡ€Π°Ρ˜ ΠΊΡ€ΠΈΠ·Π½Π°Ρ‚Π° Скономска ΡΠΈΡ‚ΡƒΠ°Ρ†ΠΈΡ˜Π° Π²ΠΎ свСтски Ρ€Π°ΠΌΠΊΠΈ, ΠΈΠ·Π΄Π²ΠΎΡ˜ΡƒΠ²Π°ΡšΠ΅ Π½Π° Π³ΠΎΠ»Π΅ΠΌΠΈ финансиски срСдства со Ρ†Π΅Π» ΠΏΠΎΠ΄Π³ΠΎΡ‚ΠΎΠ²ΠΊΠ° Π·Π° ΠΎΠ΄Π³ΠΎΠ²ΠΎΡ€ Π½Π° Π½ΠΎΠ²ΠΈ Π²ΠΎΠ½Ρ€Π΅Π΄Π½ΠΈ ΡΠΎΡΡ‚ΠΎΡ˜Π±ΠΈ ΠΊΠΎΠΈ Π±ΠΈ Π±ΠΈΠ»Π΅ ΠΏΡ€ΠΈΡ‡ΠΈΠ½Π΅Ρ‚ΠΈ ΠΎΠ΄ Π³Π»ΠΎΠ±Π°Π»Π½ΠΈΡ‚Π΅ ΡΠ°Ρ˜Π±Π΅Ρ€ Π½Π°ΠΏΠ°Π΄ΠΈ

    A novel approach for mitigating the effects of the TCP SYN flood DDoS attacks

    Get PDF
    Today’s modern society greatly depends on computer systems. Security is a basic need for any computer system. This is more than acceptable if we consider that any disruption of the normal function of the computer and networks may lead to catastrophic consequences. The most frequently attacks conducting malicious activities against the networks and systems are the Distributed Denial of Service (DDoS) attacks. The paper concerns the TCP (Transmission Control Protocol) vulnerability that gives space for a type of DoS (Denial of Service) attack called TCP-SYN Flood DDoS attack which is well-known to the community for several years. It explains in more detail the TCP SYN Flood DDoS attacks and methods for preventing and mitigating the effects of these attacks. Furthermore, the paper proposes a novel method consisting of five modules which can be used for mitigation and protection against the considered TCP SYN Flood attack, as well as against other similar flooding based attacks

    Computer Incidents Analysis based on Live Response Script

    Get PDF
    In the course of providing electronic evidence a number of commercial tools are used. The users of this tolls very often are not able to explain the way they are operating and the manner in which the report is generated. There is an increased need for developing and using of scripts and programs which can be used to provide information from information systems which are not switched off. At the same time the examiners must be able to explain the script functionality and generated result and information. In this paper we are presenting a developed script which can be used to perform a live forensics analysis used to analyze volatile data

    Steganography in Support of the Global Terrorism

    No full text
    The way of conducting terrorism with the time is becoming more sophisticated. Namely, there are eight different ways in which contemporary terrorists use the Internet, ranging from psychological warfare and propaganda to highly instrumental uses such as fundraising, recruitment, data mining, and coordination of actions. Coordination of the terrorist activity is key for their success. However coordination of their global activity is going through global network controlled and often monitored by ISPs (Internet Service Providers), LEAs (Law Enforcement Agencies), and different security and intelligence agencies. The terrorists are aware that the messages sent to their perpetrators through the Internet can be intercepted very easily and thus their intentions can be detected. Therefore, they are using different methods to protect their information. The two most used techniques of information protection are cryptography and information hiding. This chapter will cover only one of the mentioned techniques which deals with information hiding, or more specific it will cover different steganography techniques and tools. It will give short review of several different steganographic tools. Furthermore, it will explain specific usage of some of these tools. The chapter also tends to explain the different steganalysis techniques that are striking a significant blow not only to the terrorist organizations, but also on any other individual or group that use steganographic techniques as a way for covert transmission of their malicious intents. The chapter will show not only practical usage of some specific steganalysis tools but also usage of some tools whose basic function are not connected with this technique but can give significant contribution in steganalysis process and determining the existence of hidden objects. $35.00 / €27.50 / Β£22.00 Add PDF to car

    Cyber operations - a permanent part of the global conflict

    No full text
    It is more than obvious that the way of conducting operations with the time are becoming more sophisticated. The cyber operations through the most severe threats known as cyber attacks and cyber terrorism are major challenges to the fast technology development. Potential targets are systems which control the nation’s defences and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast grown of the Internet users and Internet dependence dramatically increased the security risks, unless there are appropriate security measures to help prevention. This book helps to understand the cyber operations conducted by terrorist organizations looking at their background, and seeing how these organizations or individuals are using the advantage of the new technology. Furthermore, the book explains the measures governments and multinational organizations are taking to help the fight against cyber terrorism

    Novel First Responder Script as a Tool for Computer Forensics

    Get PDF
    The computer forensics as a branch of digital forensic pertaining to legal evidence found in computers and digital storage media. In order forensic acquisition to be more reliable it must be performed on computers that have been powered off. This type of forensics is known as β€˜traditional’ or 'dead' forensic acquisition. However, this type of forensic cannot be used to collect and analyze the information which is not on the hard disk, or encrypted data. The disadvantages of the dead forensics can be overcome handling a live forensics acquisition process. There are many commercial and freeware tools which can be used to provide information based on live forensics acquisition. The problem with this tools is that in many cases the examiner cannot explain the script functionality and generated results and information. Because of this reason there is a increased need for developing and using script which can be easy explained and adapted to any analysis which should be made by the examiners. The paper presents a developed First Responder script which can be used to perform a live forensics analysis

    Π•Ρ‚ΠΈΠΎΠ»ΠΎΠ³ΠΈΡ˜Π° Π½Π° ΡΠ΅ΠΌΠ΅Ρ˜Π½ΠΎΡ‚ΠΎ насилство

    Get PDF
    Апстракт: Насилството Π²ΠΎ ΡΠ΅ΠΌΠ΅Ρ˜ΡΡ‚Π²ΠΎΡ‚ΠΎ прСтставува слоТСн ΠΊΡ€ΠΈΠΌΠΈΠ½ΠΎΠ»ΠΎΡˆΠΊΠΈ, ΡΠΎΡ†ΠΈΠΎΠ»ΠΎΡˆΠΊΠΈ, Π²ΠΈΠΊΡ‚ΠΈΠΌΠΎΠ»ΠΎΡˆΠΊΠΈ ΠΈ ΠΊΡ€ΠΈΠ²ΠΈΡ‡Π½ΠΎΠΏΡ€Π°Π²Π΅Π½ ΠΏΡ€Π΅Π΄ΠΈΠ·Π²ΠΈΠΊ Π½Π° соврСмСното ΠΎΠΏΡˆΡ‚Π΅ΡΡ‚Π²ΠΎ. Високата зачСстСност, сСриознитС послСдици, ΠΊΠ°ΠΊΠΎ Π½Π° нСпосрСднитС, Ρ‚Π°ΠΊΠ° ΠΈ Π½Π° посрСднитС ΠΆΡ€Ρ‚Π²ΠΈ, Ρ‚Π΅ΡˆΠΊΠΎΡ‚ΠΈΠΈΡ‚Π΅ ΠΏΡ€ΠΈ ΠΎΡ‚ΠΊΡ€ΠΈΠ²Π°ΡšΠ΅Ρ‚ΠΎ ΠΈ ΠΏΡ€ΠΎΡ†Π΅ΡΡƒΠΈΡ€Π°ΡšΠ΅Ρ‚ΠΎ Π½Π° сторитСлитС, ΠΏΡ€Π°Π²Π°Ρ‚ Π΄Π° ΠΎΠ²Π°Π° појава Π±Π°Ρ€Π° Π½Π΅ΠΎΠ΄Π»ΠΎΠΆΠ½Π° ΠΎΠΏΡˆΡ‚Π΅ΡΡ‚Π²Π΅Π½Π° Ρ€Π΅ΠΊΠ°Ρ†ΠΈΡ˜Π°. Π‘Π°ΠΌΠ°Ρ‚Π° ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΠ°Ρ‚ΠΈΠΊΠ° Π½Π° насилството Π²ΠΎ ΡΠ΅ΠΌΠ΅Ρ˜ΡΡ‚Π²ΠΎΡ‚ΠΎ ΡƒΠΏΠ°Ρ‚ΡƒΠ²Π° Π½Π° комплСксноста ΠΈ опасноста, ΠΈ ΠΏΠΎΡ‚Ρ€Π΅Π±Π°Ρ‚Π° Π½Π° интСрдисциплинарно ΠΏΡ€ΠΎΡƒΡ‡ΡƒΠ²Π°ΡšΠ΅ ΠΈ Π΄Π΅Ρ˜ΡΡ‚Π²ΡƒΠ²Π°ΡšΠ΅ Π½Π° ΠΏΡ€Π΅Π²Π΅Π½Ρ‚ΠΈΠ²Π΅Π½ ΠΈ рСпрСсивСн ΠΏΠ»Π°Π½. Π‘Π΅ΠΌΠ΅Ρ˜Π½ΠΎΡ‚ΠΎ насилство Π΅ слоТСна ΠΈ ΠΏΠΎΠ²Π΅ΡœΠ΅ΡΡ‚Π΅ΠΏΠ΅Π½Π° условСна појава која сС Ρ€Π°Π·Π²ΠΈΠ²Π° Π½Π° Ρ€Π°Π·Π»ΠΈΡ‡Π½ΠΈ Π½Π°Ρ‡ΠΈΠ½ΠΈ ΠΈ ΠΈΠΌΠ° Ρ€Π°Π·Π»ΠΈΡ‡Π½ΠΈ обСлСТја. Π‘ΠΎ Π΄ΠΎΠ±Ρ€ΠΎ ΠΎΡ€Π³Π°Π½ΠΈΠ·ΠΈΡ€Π°ΡšΠ΅ Π½Π° ситС Ρ€Π΅Π»Π΅Π²Π°Π½Ρ‚Π½ΠΈ ΠΎΠΏΡˆΡ‚Π΅ΡΡ‚Π²Π΅Π½ΠΈ Ρ„Π°ΠΊΡ‚ΠΎΡ€ΠΈ ΠΈ Π½ΠΈΠ²Π½ΠΈ пристап Π²ΠΎ Ρ€Π΅ΡˆΠ°Π²Π°ΡšΠ΅Ρ‚ΠΎ Π½Π° овој слоТСн ΠΈ Ρ‚Π΅ΡˆΠΊΠΎ Π²ΠΎΠΎΡ‡Π»ΠΈΠ² ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌ Π±ΠΈ сС Π½Π°ΠΌΠ°Π»ΠΈΠ»Π° ΠΏΠΎΡ˜Π°Π²Π½ΠΎΡΡ‚Π° Π½Π° насилството Π²ΠΎ ΡΠ΅ΠΌΠ΅Ρ˜ΡΡ‚Π²ΠΎΡ‚ΠΎ. ΠšΠ»ΡƒΡ‡Π½ΠΈ Π·Π±ΠΎΡ€ΠΎΠ²ΠΈ: ΡΠ΅ΠΌΠ΅Ρ˜ΡΡ‚Π²ΠΎ, сСмСјни Ρ„Π°ΠΊΡ‚ΠΎΡ€ΠΈ, насилство, сСмСјно насилств

    Novel First Responder Digital Forensics Tool as a Support to Law Enforcement

    No full text
    There are many freeware and commercial tools which can be used to provide forensics information based on dead and live forensics acquisition. The main problem with these tools is that in many cases the investigator cannot explain the script functionality and generated results and information during the trial. Because of this reason there is an increased need for developing and using script which can be easy explained and adapted to any analysis which should be made by the examiners. The chapter presents a novel developed First Responder script which can be used to perform a live and dead forensics analysis in support of Law Enforcement during the investigation process

    Cyber security issues of telecommunication infrastructure

    Get PDF
    We live in a well connected and technology dependent world. People, institutions, companies have increasing need for communication in everyday life. Global and seamless connectivity today is enabled by complex telecommunications infrastructure consisted of a large variety of different technologies which are in a continuous process of development and innovations. But, the global connectivity and easy access to modern technology also enables malicious users and their activities. These activities might be of different nature: starting from passive monitoring to destructive attacks disabling the normal operation of ICT (information and communication technology) infrastructure. Therefore, security issues of telecommunication infrastructure must be thoroughly addressed by all relevant stakeholders. Although each technology includes certain security mechanisms, it is necessary to create well designed security concept for the infrastructure as a whole, taking into consideration not only the technical issues, but also policy framework and legal aspects. The concept must be a subject of constant revision in order to be up to date to current threats. Therefore, the network infrastructure must be always monitored and analyzed, in order to create efficient measures against the security threats. The telecommunication infrastructure in the Republic of Macedonia is owned and operated by state institutions, telecom operators and providers, other companies and universities etc. All of them are faced with number of malicious activities and attacks exploiting vulnerabilities of the systems, which are well monitored and statistically analyzed. Also, all of them has defined more or less effective security concept including proactive and reactive measures. However, a common practice of cooperation and exchange of information and experience among the subjects is missing. A national strategy and policy framework are also missing. Their creation and devoted implementation would be beneficial for all stakeholders resulting in more effective and less expensive solutions as a response to cyber attack
    corecore