共查询到20条相似文献,搜索用时 15 毫秒
1.
Fred Cohen 《Network Security》2000,2000(1):18-20
Computing operates in an almost universally networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programs has increasingly become a function of our ability to make prudent management decisions about organizational activities. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
2.
Min-Jen Tsai Jin-Shen Yin Imam Yuadi Jung Liu 《Multimedia Tools and Applications》2014,73(3):2129-2155
Recently, digital forensics, which involves the collection and analysis of the origin digital device, has become an important issue. Digital content can play a crucial role in identifying the source device, such as serve as evidence in court. To achieve this goal, we use different texture feature extraction methods such as graylevel co-occurrence matrix (GLCM) and discrete wavelet transform (DWT), to analyze the Chinese printed source in order to find the impact of different output devices. Furthermore, we also explore the optimum feature subset by using feature selection techniques and use support vector machine (SVM) to identify the source model of the documents. The average experimental results attain a 98.64 % identification rate which is significantly superior to the existing known method of GLCM by 1.27 %. The superior testing performance demonstrates that the proposed identification method is very useful for source laser printer identification. 相似文献
3.
Digital visual media represent nowadays one of the principal means for communication. Lately, the reliability of digital visual
information has been questioned, due to the ease in counterfeiting both its origin and content. Digital image forensics is
a brand new research field which aims at validating the authenticity of images by recovering information about their history.
Two main problems are addressed: the identification of the imaging device that captured the image, and the detection of traces
of forgeries. Nowadays, thanks to the promising results attained by early studies and to the always growing number of applications,
digital image forensics represents an appealing investigation domain for many researchers. This survey is designed for scholars
and IT professionals approaching this field, reviewing existing tools and providing a view on the past, the present and the
future of digital image forensics. 相似文献
4.
Multimedia Tools and Applications - When trying to identify a printed forged document, examining digital evidence can prove to be a challenge. In this study, microscopic images are used for printed... 相似文献
5.
Zakariah Mohammed Khan Muhammad Khurram Malik Hafiz 《Multimedia Tools and Applications》2018,77(1):1009-1040
Multimedia Tools and Applications - Digital audio forensics is used for a variety of applications ranging from authenticating audio files to link an audio recording to the acquisition device (e.g.,... 相似文献
6.
7.
8.
Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens’ Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. 相似文献
9.
分析计算机取证的技术基点,微格细化计算机证据形成证据链的技术流程,归纳出证据链形成过程中的获取与固化、鉴定与研判,存档与呈现等主要阶段的工作内容,为开展相关研究提供参考. 相似文献
11.
Dov Te’eni 《欧洲信息系统杂志》2017,26(3):237-239
12.
13.
将从数字取证的定义、发展趋向、本质特点等方面对已有的研究成果进行总结归纳,以使读者对于数字取证的研究方法、研究特点和发展方向等能有一个比较全面的了解,为开展相关研究提供参考。 相似文献
14.
15.
龚健虎 《网络安全技术与应用》2014,(8):109-110
云计算技术的迅猛发展,其带来的商业运营和信息服务模式的变化,为越来越多的企业所接受后,作为信息系统核心的数据中心也开始一步步地朝着云计算数据中心发展。在云计算环境下,云计算信息系统主要由云计算数据中心和用户端组成。数据中心是核心,是大脑,是所有资源汇集之处,是信息的枢纽,它通过网络向企业或公众提供信息服务。本文将结合云计算关键技术,对计算机反取证技术进行研究,有利于计算机取证人员的取证有效性。 相似文献
16.
17.
本文介绍了当前网络犯罪打击的难点以及提出了一系列的思考与对策,给公安机关执法人员在对待各种新的网络犯罪时,提供了新的启示和策略。 相似文献
18.
19.
20.
《Security & Privacy, IEEE》2004,2(4):72-78
A major goal of honeypot research is to improve our knowledge of blackhats from two perspectives: technical and ethnological. For the former we want new ways to discover rootkits, Trojans, and potential zero-day exploits. For the latter, we want a better understanding of the areas of interest and hidden links between blackhat teams. One way to achieve these goals is to increase the verbosity of our honeypot logs and traces so that we learn every single action the intruder made. The most common tools for doing this are Sebek for system events and Snort for network activity. Unfortunately, there is no easy way to correlate information from these sources, which complicates honeypot forensics. Although computer forensics focuses on analyzing a system once we suspect it has been compromised, we expect honeypots to be compromised. Thus, honeypot forensics focuses on understanding the blackhat's techniques and tools, before and after its intrusion on the honeypot. The article looks at: network activity analysis; building the network timeline; and tools and techniques. 相似文献