Ismaila et al., 2020 - Google Patents
Digital Forensics and Incident ResponseIsmaila et al., 2020
View PDF- Document ID
- 1098612516981041567
- Author
- Ismaila I
- Mustafa S Z
- Publication year
External Links
Snippet
Technology has brought about significant improvement in our lives, from online grocery shopping to e-learning, automated farming, remote-controlled surveillance systems and smart homes. All these have one thing in common, which is the Internet. While the low cost …
- 230000004044 response 0 title description 54
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Quick et al. | Cloud storage forensics | |
| Kent et al. | Guide to integrating forensic techniques into incident | |
| Ab Rahman et al. | Cloud incident handling and forensic‐by‐design: cloud storage as a case study | |
| Årnes | Digital forensics | |
| Barmpatsalou et al. | Current and future trends in mobile device forensics: A survey | |
| US11003790B2 (en) | Preventing data leakage via version control systems | |
| Lin et al. | Introductory computer forensics | |
| Serketzis et al. | Actionable threat intelligence for digital forensics readiness | |
| Zhang et al. | A design science approach to developing an integrated mobile app forensic framework | |
| Kent et al. | Sp 800-86. guide to integrating forensic techniques into incident response | |
| Shaaban et al. | Practical windows forensics | |
| Cho et al. | Conversational AI forensics: A case study on ChatGPT, Gemini, Copilot, and Claude | |
| Azhar et al. | Forensic investigations of Google Meet and Microsoft Teams–two popular conferencing tools in the pandemic | |
| Ashawa et al. | Digital forensics challenges in cyberspace: overcoming legitimacy and privacy issues through modularisation | |
| Patel et al. | A Survey on Mobile Digital Forensic: Taxonomy, Tools, and Challenges | |
| Mider et al. | The Internet Data Collection with the Google Hacking Tool–White, Grey or Black Open-Source Intelligence? | |
| Mohiddin et al. | Role of cloud forensics in cloud computing | |
| Sharma et al. | IoT forensics in ambient intelligence environments: Legal issues, research challenges and future directions | |
| Ismaila et al. | Digital Forensics and Incident Response | |
| Hemdan et al. | Exploring digital forensic investigation issues for cyber crimes in cloud computing environment | |
| Shivdas | A Complete Handbook for Digital Forensics Investigator | |
| Dyson | Blockchain Investigations-Beyond the ‘Money’ | |
| Clarke | Computer forensics a pocket guide | |
| Lokhande et al. | Digital forensics analysis for data theft | |
| Karlzén | An Analysis of Security Information and Event Management Systems-The Use or SIEMs for Log Collection, Management and Analysis |