ºÝºÝߣshows by User: kalaiselvishekar / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: kalaiselvishekar / Wed, 10 Jul 2013 00:29:40 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: kalaiselvishekar Crimeppt /slideshow/crimeppt/24083496 crimeppt-130710002940-phpapp02
Abstract- Network forensics deals with the capture, recording and analysis of network events in order to discover evidential information about the source of security attacks in a court of law. This paper discuss the different tools and techniques available to conduct network forensics. Some of the tools under discussion include: eMailTrackerPro–to identify the physical location of an email sender;WebHistorian–to find the duration of each visit and the files uploaded and downloaded from the visited website;packetsniffers like Ethereal–to capture and analyze the data exchanged among the different computers in the network. The second half of the paper presents a survey of different IPtraceback techniques like packet marking that help a forensic investigator to identify the true sources of the attacking IP packets. We also discuss the use of Honey pots and Honey nets that gather intelligence about the enemy and the tools and tactics of network intruders. The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal, deny access to, or destroy valuable information. Self-protection, while essential, is not sufficient to make cyberspace a safe place to conduct business. The rule of law must also be enforced. Countries where legal protections are inadequate will become increasingly less able to compete in the new economy. As cyber crime increasingly breaches national borders, nations perceived as havens run the risk of having their electronic messages blocked by the network .National governments should examine their current statutes to determine whether they are sufficient to combat the kinds of crimes discussed in this report. Where gaps exist, governments should draw on best practices from other countries and work closely with industry to enact enforceable legal protections against these new crimes. This report analyzes the state of the law in 52 countries. It finds that only ten of these nations have amended their laws to cover more than half of the kinds of crimes that need to be addressed. While many of the others have initiatives underway, it is clear that a great deal of additional work is needed before organizations and individuals can be confident that cyber criminals will think twice before attacking valued systems and information. ]]>

Abstract- Network forensics deals with the capture, recording and analysis of network events in order to discover evidential information about the source of security attacks in a court of law. This paper discuss the different tools and techniques available to conduct network forensics. Some of the tools under discussion include: eMailTrackerPro–to identify the physical location of an email sender;WebHistorian–to find the duration of each visit and the files uploaded and downloaded from the visited website;packetsniffers like Ethereal–to capture and analyze the data exchanged among the different computers in the network. The second half of the paper presents a survey of different IPtraceback techniques like packet marking that help a forensic investigator to identify the true sources of the attacking IP packets. We also discuss the use of Honey pots and Honey nets that gather intelligence about the enemy and the tools and tactics of network intruders. The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal, deny access to, or destroy valuable information. Self-protection, while essential, is not sufficient to make cyberspace a safe place to conduct business. The rule of law must also be enforced. Countries where legal protections are inadequate will become increasingly less able to compete in the new economy. As cyber crime increasingly breaches national borders, nations perceived as havens run the risk of having their electronic messages blocked by the network .National governments should examine their current statutes to determine whether they are sufficient to combat the kinds of crimes discussed in this report. Where gaps exist, governments should draw on best practices from other countries and work closely with industry to enact enforceable legal protections against these new crimes. This report analyzes the state of the law in 52 countries. It finds that only ten of these nations have amended their laws to cover more than half of the kinds of crimes that need to be addressed. While many of the others have initiatives underway, it is clear that a great deal of additional work is needed before organizations and individuals can be confident that cyber criminals will think twice before attacking valued systems and information. ]]>
Wed, 10 Jul 2013 00:29:40 GMT /slideshow/crimeppt/24083496 kalaiselvishekar@slideshare.net(kalaiselvishekar) Crimeppt kalaiselvishekar Abstract- Network forensics deals with the capture, recording and analysis of network events in order to discover evidential information about the source of security attacks in a court of law. This paper discuss the different tools and techniques available to conduct network forensics. Some of the tools under discussion include: eMailTrackerPro–to identify the physical location of an email sender;WebHistorian–to find the duration of each visit and the files uploaded and downloaded from the visited website;packetsniffers like Ethereal–to capture and analyze the data exchanged among the different computers in the network. The second half of the paper presents a survey of different IPtraceback techniques like packet marking that help a forensic investigator to identify the true sources of the attacking IP packets. We also discuss the use of Honey pots and Honey nets that gather intelligence about the enemy and the tools and tactics of network intruders. The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal, deny access to, or destroy valuable information. Self-protection, while essential, is not sufficient to make cyberspace a safe place to conduct business. The rule of law must also be enforced. Countries where legal protections are inadequate will become increasingly less able to compete in the new economy. As cyber crime increasingly breaches national borders, nations perceived as havens run the risk of having their electronic messages blocked by the network .National governments should examine their current statutes to determine whether they are sufficient to combat the kinds of crimes discussed in this report. Where gaps exist, governments should draw on best practices from other countries and work closely with industry to enact enforceable legal protections against these new crimes. This report analyzes the state of the law in 52 countries. It finds that only ten of these nations have amended their laws to cover more than half of the kinds of crimes that need to be addressed. While many of the others have initiatives underway, it is clear that a great deal of additional work is needed before organizations and individuals can be confident that cyber criminals will think twice before attacking valued systems and information. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/crimeppt-130710002940-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Abstract- Network forensics deals with the capture, recording and analysis of network events in order to discover evidential information about the source of security attacks in a court of law. This paper discuss the different tools and techniques available to conduct network forensics. Some of the tools under discussion include: eMailTrackerPro–to identify the physical location of an email sender;WebHistorian–to find the duration of each visit and the files uploaded and downloaded from the visited website;packetsniffers like Ethereal–to capture and analyze the data exchanged among the different computers in the network. The second half of the paper presents a survey of different IPtraceback techniques like packet marking that help a forensic investigator to identify the true sources of the attacking IP packets. We also discuss the use of Honey pots and Honey nets that gather intelligence about the enemy and the tools and tactics of network intruders. The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal, deny access to, or destroy valuable information. Self-protection, while essential, is not sufficient to make cyberspace a safe place to conduct business. The rule of law must also be enforced. Countries where legal protections are inadequate will become increasingly less able to compete in the new economy. As cyber crime increasingly breaches national borders, nations perceived as havens run the risk of having their electronic messages blocked by the network .National governments should examine their current statutes to determine whether they are sufficient to combat the kinds of crimes discussed in this report. Where gaps exist, governments should draw on best practices from other countries and work closely with industry to enact enforceable legal protections against these new crimes. This report analyzes the state of the law in 52 countries. It finds that only ten of these nations have amended their laws to cover more than half of the kinds of crimes that need to be addressed. While many of the others have initiatives underway, it is clear that a great deal of additional work is needed before organizations and individuals can be confident that cyber criminals will think twice before attacking valued systems and information.
Crimeppt from Kalaiselvi k
]]>
204 4 https://cdn.slidesharecdn.com/ss_thumbnails/crimeppt-130710002940-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-kalaiselvishekar-48x48.jpg?cb=1638110731