Автор: Regner Sabillon
Издательство: IGI Global
Год: 2021
Страниц: 275
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB
With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place.
If you are using freeware or shareware tools, consider to get expertise on your tools as you may encounter some issues from courts, lawyers and judges in order to validate credibility, functions, reliability and acceptance of your digital evidence conclusions. Some tools include Safecopy, Metaviewer, Hash, Filematch, Disk Explorer for NTFS, Disk explorer for FAT, DriveImageXL, Captain Nemo, DriveLook, Disk Investigator, Directory Snoop and Winhex.
Online storage and anonymous activities include using anonymous e-mail accounts, attacker’s data that can be stored anywhere and the use of BGP (Border Gateway Protocol) to create spoof IP addresses to launch cyberattacks. And the use of techniques to attack cyberforensic investigators, exploit cyberforensic tool bugs and even to implicate them. Some of these attacks exploit buffer-overflow bugs in programs like tcpdump, snort and ethereal. By launching Denial-of-Service (DoS) attacks that use techniques like creating millions of files, overwhelming the logs and using zip bombs (42.zip).
Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.
Скачать Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM