Skip to main content

2017 | OriginalPaper | Buchkapitel

14. Computer and Network Forensics

verfasst von : Joseph Migga Kizza

Erschienen in: Guide to Computer Network Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The proliferation of computer technology, including wireless technology and telecommunication, the plummeting prices of these technologies, the miniaturization of computing and telecommunication devices, and the globalization forces have all together contributed to our ever-growing dependence on computer technology. This growing dependence has been a bonanza to computer criminals who have seen this as the best medium to carry out their missions. In fact, Richard Rubin [1] has called this new environment a tempting environment to cybercriminals, and he gives seven compelling reasons that cause such temptations. They are as follows:
  • Speed. Both computer and telecommunication technology have greatly increased the speed of transmission of digital data, which means that one can violate common decency concerning transmission of such data speedily and not get caught in the act. Also, the act is over before one has time to analyze its consequences and one’s guilt.
  • Privacy and Anonymity. There is a human weakness that if no one is a witness to an act one has committed, then there is less to no guilt on the doer’s part. Privacy and anonymity, both of which can be easily attained using this new technology, support this weakness enabling one to create what can be called “moral distancing” from one’s actions.
  • Nature of Medium. The nature of storage and transmission of digital information in the digital age is different in many aspects from that of the Gutenberg-print era. The electronic medium of the digital age permits one to steal information without actually removing it. This virtual ability to remove and leave the original “untouched” is a great temptation, creating an impression that nothing has been stolen.
  • Aesthetic Attraction. Humanity is endowed with a competitive zeal to achieve far and beyond our limitations. So we naturally get an adrenaline high whenever we accomplish a feat that seems to break down the efforts of our opponents or the walls of the unknown. It is this high that brings about a sense of accomplishment and creative pride whenever not so well-known creative individuals come up with elegant solutions to technological problems. This fascination and a sense of accomplishment create an exhilaration among criminals that mitigates the value and the importance of the information attacked and justifies the action itself.
  • Increased Availability of Potential Victims. There is a sense of amusement and ease to know that with just a few key strokes, one’s message and action can be seen and consequently felt over wide areas and by millions of people. This sense unfortunately can very easily turn into evil feelings as soon as one realizes the power he or she has over millions of invisible and unsuspecting people.
  • International Scope. The global reach of cyberspace creates an appetite for greater monetary, economic, and political powers. The ability to cover the globe in a short time and to influence an entire global community can make a believer out of a nonbeliever.
  • Enormous Powers. The international reach, the speed, and the distancing of one self from the act endow enormous powers to an individual which may lead to criminal activities.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Rubin R (1996) More distancing and the use of information: the seven temptations. In: Kizza JM (ed) Social and ethical effects of the computer revolution. McFarland & Company, Jefferson Rubin R (1996) More distancing and the use of information: the seven temptations. In: Kizza JM (ed) Social and ethical effects of the computer revolution. McFarland & Company, Jefferson
3.
Zurück zum Zitat Nelson B, Amelia P, Frank E, Chris S (2004) Guide to computer forensics and investigations. Course Technologies, Boston Nelson B, Amelia P, Frank E, Chris S (2004) Guide to computer forensics and investigations. Course Technologies, Boston
4.
Zurück zum Zitat Berghel H. The discipline of internet forensics. Communications of the ACM, August 2003 46(8) Berghel H. The discipline of internet forensics. Communications of the ACM, August 2003 46(8)
5.
Zurück zum Zitat Kruse W II, Jay GH (2002) Computer forensics: incident response essentials. Addison-Wesley, Reading Kruse W II, Jay GH (2002) Computer forensics: incident response essentials. Addison-Wesley, Reading
6.
Zurück zum Zitat Sammes T, Brian J (2000) Forensic computing: a practitioner’s guide. Springer, LondonCrossRef Sammes T, Brian J (2000) Forensic computing: a practitioner’s guide. Springer, LondonCrossRef
8.
Zurück zum Zitat Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4) Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4)
10.
Zurück zum Zitat Pipkin DL (2000) Information security: protecting the global enterprise. Prentice Hall PTR, Upper Saddle River Pipkin DL (2000) Information security: protecting the global enterprise. Prentice Hall PTR, Upper Saddle River
Metadaten
Titel
Computer and Network Forensics
verfasst von
Joseph Migga Kizza
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-55606-2_14

Neuer Inhalt