[go: up one dir, main page]

Ismaila et al., 2020 - Google Patents

Digital Forensics and Incident Response

Ismaila et al., 2020

View PDF
Document ID
1098612516981041567
Author
Ismaila I
Mustafa S Z
Publication year

External Links

Snippet

Technology has brought about significant improvement in our lives, from online grocery shopping to e-learning, automated farming, remote-controlled surveillance systems and smart homes. All these have one thing in common, which is the Internet. While the low cost …
Continue reading at irepo.futminna.edu.ng:8080 (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
    • G06Q40/025Credit processing or loan processing, e.g. risk analysis for mortgages
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras

Similar Documents

Publication Publication Date Title
Quick et al. Cloud storage forensics
Kent et al. Guide to integrating forensic techniques into incident
Ab Rahman et al. Cloud incident handling and forensic‐by‐design: cloud storage as a case study
Årnes Digital forensics
Barmpatsalou et al. Current and future trends in mobile device forensics: A survey
US11003790B2 (en) Preventing data leakage via version control systems
Lin et al. Introductory computer forensics
Serketzis et al. Actionable threat intelligence for digital forensics readiness
Zhang et al. A design science approach to developing an integrated mobile app forensic framework
Kent et al. Sp 800-86. guide to integrating forensic techniques into incident response
Shaaban et al. Practical windows forensics
Cho et al. Conversational AI forensics: A case study on ChatGPT, Gemini, Copilot, and Claude
Azhar et al. Forensic investigations of Google Meet and Microsoft Teams–two popular conferencing tools in the pandemic
Ashawa et al. Digital forensics challenges in cyberspace: overcoming legitimacy and privacy issues through modularisation
Patel et al. A Survey on Mobile Digital Forensic: Taxonomy, Tools, and Challenges
Mider et al. The Internet Data Collection with the Google Hacking Tool–White, Grey or Black Open-Source Intelligence?
Mohiddin et al. Role of cloud forensics in cloud computing
Sharma et al. IoT forensics in ambient intelligence environments: Legal issues, research challenges and future directions
Ismaila et al. Digital Forensics and Incident Response
Hemdan et al. Exploring digital forensic investigation issues for cyber crimes in cloud computing environment
Shivdas A Complete Handbook for Digital Forensics Investigator
Dyson Blockchain Investigations-Beyond the ‘Money’
Clarke Computer forensics a pocket guide
Lokhande et al. Digital forensics analysis for data theft
Karlzén An Analysis of Security Information and Event Management Systems-The Use or SIEMs for Log Collection, Management and Analysis