|
FloCon 2015 Preventive Digital Forensics by Jesus Ramirez Pichardo |
Si vous voulez bloquer ce service sur vos fils RSS
Si vous voulez nous contacter ou nous proposer un fil RSS
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
FloCon 2015 Preventive Digital Forensics by Jesus Ramirez PichardoPar SecurityTube.NetLe [2016-02-04] à 07:44:07 Présentation : Traditionally digital forensics has taken a post-mortem or reactive approach. That is, once a security incident is identified, evidence acquisition begins, and this step generally takes place long after the incident is identified. By then, it is possible that the evidence no longer exists or has been modified. In these scenarios, it is unlikely that the digital forensic investigator, with the little evidence gained, can provide accurate answers about what happened to the evidence. It then becomes necessary to develop a more proactive approach, Preventive Digital Forensics, which proposes a modification to the traditional digital forensics NIST SP 800-86 , and is based on experimentation, iteration, and learning. This approach 1 allows us to design, develop, and evaluate a set of digital forensic capabilities that are implemented in an organization s critical IT services, and 2 facilitates digital forensic tasks, making it easier to discover and evaluate indicators of malicious behavior. The approach then contributes to forming an effective response to computer security incidents in the shortest possible time and with reduced cost. In this context, the pre-incident evidence the product of Preventive Digital Forensics is a reliable source to detect and to mitigate threats. For More Information Please Visit - http www.sei.cmu.edu Les derniers articles du site "SecurityTube.Net" :- TROOPERSCON - Crypto code the 9 circles of testing- TROOPERSCON - Towards a LangSec Aware SDLC- TROOPERSCON - Deep dive into SAP archive file formats- TROOPERSCON - Thanks SAP for the vulnerabilities. Exploiting the unexploitable- TROOPERSCON - An easy way into your multi-million dollar SAP systems An unknown default SAP account- TROOPERSCON - One Tool To Rule Them All- TROOPERSCON - Mind The Gap - Exploit Free Whitelisting Evasion Tactics- TROOPERSCON - The Chimaera Processor- TROOPERSCON - Lets Play Hide and Seek in the Cloud- TROOPERSCON - Planes, Trains and Automobiles The Internet of Deadly Things
Menu > Articles de la revue de presse : - l'ensemble [ tous | francophone] - par mots clé [ tous] - par site [ tous] - le tagwall [ voir] - Top bi-hebdo de la revue de presse [ Voir]
Si vous voulez bloquer ce service sur vos fils RSS :
- avec iptables "iptables -A INPUT -s 88.190.17.190 --dport 80 -j DROP"
- avec ipfw et wipfw "ipfw add deny from 88.190.17.190 to any 80"
- Nous contacter par mail
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|