Essays about: "IT forensics"

Showing result 1 - 5 of 47 essays containing the words IT forensics.

  1. 1. Peering into the Dark : A Dark Web Digital Forensic Investigation on Windows 11

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Johanna Kahlqvist; Frida Wilke; [2023]
    Keywords : Dark Web; Digital Forensics; The Onion Router Tor ; Windows 11;

    Abstract : The ability to access the Internet while remaining anonymous is a necessity in today's society. Whistleblowers need it to establish contact with journalists, and individuals living under repressive regimes need it to access essential resources. READ MORE

  2. 2. Big Data Analytics Using Apache Flink for Cybercrime Forensics on X (formerly known as Twitter)

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Manjunath Kakkepalya Puttaswamy; [2023]
    Keywords : Apache Flink; Apache Spark; Big Data; Twitter; X;

    Abstract : The exponential growth of social media usage has led to massive data sharing, posing challenges for traditional systems in managing and analyzing such vast amounts of data. This surge in data exchange has also resulted in an increase in cyber threats from individuals and criminal groups. READ MORE

  3. 3. Anti-forensic Techniques: Feasibility and Efficiency against Forensic Tools

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Josef Al-Saydali; Mahdi Al-Saydali; [2023]
    Keywords : ;

    Abstract : The anti-forensics process using different methods to hide information or alter it which can lead theinvestigation to the wrong direction. The rising of new skills and experience levels can put the wholeinvestigation in jeopardy especially in the aspect of financial and time loss. READ MORE

  4. 4. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dingli Mao; [2023]
    Keywords : Threat Modeling; Security and Risk Analysis; Forensic Evidence; Domain Specific Language; hotmodellering; Säkerhet och riskanalys; Kriminaltekniska bevis; Domänspecifikt språk;

    Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE

  5. 5. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Keywords : Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Abstract : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). READ MORE