skip to main content
article
Free Access

Investigating sophisticated security breaches

Published:01 February 2006Publication History
Skip Abstract Section

Abstract

Sophisticated intruders take full advantage of the lack of forensic readiness. To respond more effectively to such attacks, computer security professionals and digital investigators must combine talents and work together.

References

  1. Brunker, M. FBI agent charged with hacking. MSNBC, Aug. 15, 2002.Google ScholarGoogle Scholar
  2. Casey, E. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, 2nd Edition. Elsevier, London, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Casey, E. Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Journal of Digital Investigation 1, 1 (2004); www.strozllc.com/ToolReview.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Casey, E. Determining Intent---Opportunistic vs Targeted Attacks, Computer Fraud & Security. Elsevier, London, 2003, 8--11.Google ScholarGoogle Scholar
  5. Casey, E. and Stanley, A. Tool Review: Remote forensic preservation and examination tools. Journal of Digital Investigation 1, 4 (2004); www.strozllc.com/Casey_Stanley_Article.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Forte, D. The art of log correlation. HTCIA Worldwide Conference (2004); www.dflabs.com/images/Art_of_correlation_Dario_Forte.pdf.Google ScholarGoogle Scholar
  7. Graham, B. Hackers attack via Chinese Web sites: U.S. agencies' networks are among targets. Washington Post (Aug. 25, 2005).Google ScholarGoogle Scholar
  8. Grance, T., Kent, K., and Kim, B. NIST Computer Security Incident Handling Guide. NIST, 2004; csrc.nist.gov/publications/nistpubs/800-61/sp800-61.pdf.Google ScholarGoogle Scholar
  9. Howell, B. Ambiguities in U.S. law for investigators. Journal of Digital Investigation 1, 2 (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Levy, S. and Stone, B. Grand theft identity. Newsweek (July 4, 2005).Google ScholarGoogle Scholar
  11. Prosise, C., Mandia, K., and Pepe, M. Incident Response and Computer Forensics, 2nd Ed. McGraw-Hill Osborne Media, Emeryville, CA, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Rowlingson, R. A ten-step process for forensic readiness. International Journal of Digital Evidence 2, 3 (2004); www.ijde.org/docs/ 04_winter_v2i3_art2.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Investigating sophisticated security breaches

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 49, Issue 2
        Next-generation cyber forensics
        February 2006
        127 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/1113034
        Issue’s Table of Contents

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 February 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format