메뉴 건너뛰기




Volumn 2, Issue 3, 2007, Pages 1-11

A theoretical framework for organizational network forensic readiness

Author keywords

Digital forensics; Network forensics; Networks

Indexed keywords

COMPUTER FORENSICS; ELECTRONIC CRIME COUNTERMEASURES; NETWORKS (CIRCUITS);

EID: 51149091325     PISSN: 1796203X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcp.2.3.1-11     Document Type: Article
Times cited : (52)

References (48)
  • 3
    • 33846017674 scopus 로고    scopus 로고
    • Embedding forensic capabilities into networks: Addressing inefficiencies in digital forensics investigations
    • 21-23 June, United States Military Academy, West Point, NY
    • Endicott-Popovsky, B and Frincke, D., "Embedding forensic capabilities into networks: addressing inefficiencies in digital forensics investigations" in Proceedings from the Seventh IEEE Systems, Man and Cybernetics Information Assurance Workshop, 21-23 June 2006, United States Military Academy, West Point, NY, pp.133-139.
    • (2006) Proceedings from the Seventh IEEE Systems, Man and Cybernetics Information Assurance Workshop , pp. 133-139
    • Endicott-Popovsky, B.1    Frincke, D.2
  • 7
    • 84866660922 scopus 로고    scopus 로고
    • Carnegie-Mellon Software Engineering Institute CERT Coordination Center, Retrieved Feb. 17
    • Carnegie-Mellon Software Engineering Institute CERT Coordination Center. (2007). "CERT/CC Statistics 1988-2006. " Retrieved Feb. 17, 2007 from the World Wide Web: http://www.cert.org/stats/cert_stats.html.
    • (2007) CERT/CC Statistics 1988-2006.
  • 11
    • 84866704628 scopus 로고    scopus 로고
    • presented at NWSec, February 15, 2007, Seattle, WA, Retrieved Feb. 17, from the World Wide Web
    • Kirk Bailey, "Trouble in cyberspace: Why this conference is important, " presented at NWSec, February 15, 2007, Seattle, WA, Retrieved Feb. 17, 2007, from the World Wide Web: http://students.washington.edu/greyhat/mainsec.html
    • (2007) Trouble in cyberspace: Why this conference is important
    • Bailey, K.1
  • 12
    • 33748435812 scopus 로고    scopus 로고
    • CSI/FBI: CSI/FBI, Computer Security Institute
    • CSI/FBI: CSI/FBI. (2005). "Computer crime and security survey, " Computer Security Institute, San Francisco, CA.
    • (2005) Computer crime and security survey
  • 13
    • 84866678113 scopus 로고    scopus 로고
    • King County Deputy Prosecutor
    • August 24, and September 29, 2006
    • Ivan Orton, King County Deputy Prosecutor. Personal interviews. August 24, 2006 and September 29, 2006.
    • (2006) Personal interviews
    • Orton, I.1
  • 15
    • 84866658241 scopus 로고    scopus 로고
    • Federal prosecutor (Retired)
    • Spring, Seattle University, Seattle, Washington
    • Schroeder, S., Federal prosecutor (Retired) (Spring, 2004). CSSE592 Computer forensics: Legal overview, Seattle University, Seattle, Washington.
    • (2004) CSSE592 Computer forensics: Legal overview
    • Schroeder, S.1
  • 17
    • 33846022189 scopus 로고    scopus 로고
    • Hacker destroys 4500 web sites
    • November 19, 1998, Retrieved August 13, 2005 from the World Wide Web
    • Barton, C. "Hacker destroys 4500 web sites, " New Zealand Herald, November 19, 1998, Retrieved August 13, 2005 from the World Wide Web: http://www.landfield.com/isn/mailarchive/ 1998/Nov/0098.html
    • (1998) New Zealand Herald
    • Barton, C.1
  • 18
    • 33846012384 scopus 로고    scopus 로고
    • New Zealand Herald, November 23, 1998, Retrieved August 13, from the World Wide Web
    • Wall, T. "Associates denounce website hacker, " New Zealand Herald, November 23, 1998, Retrieved August 13, 2005 from the World Wide Web: http://www.landfield.com/isn/mail-archive/1998/Nov/0098.html
    • (2005) Associates denounce website hacker
    • Wall, T.1
  • 20
    • 85046982838 scopus 로고    scopus 로고
    • ®, Retrieved August 02
    • ®"Incident Note IN-98.04: Advanced scanning. " Retrieved August 02, 2005 from the World Wide Web: http://www.cert.org/incident_notes/IN-98.04.html
    • Incident Note IN-98.04: Advanced scanning.
  • 21
    • 84866658242 scopus 로고    scopus 로고
    • Honeynet Project
    • Retrieved August 04
    • Honeynet Project. (2000). "Know your enemy III: They gain root. " Retrieved August 04, 2005, from the World Wide Web: http://project.honeynet.org/papers/enemy3/index.html
    • (2000) Know your enemy III: They gain root.
  • 22
    • 84866643341 scopus 로고    scopus 로고
    • Developing an effective incident cost analysis mechanism
    • June 12, 2002. Retrieved August 14, from the World Wide Web
    • Dittrich, D. "Developing an effective incident cost analysis mechanism, " Security Focus, June 12, 2002. Retrieved August 14, 2005 from the World Wide Web: http://online.securityfocus.com/infocus/1592
    • (2005) Security Focus
    • Dittrich, D.1
  • 23
    • 84866678119 scopus 로고    scopus 로고
    • Real-world access control systematic failures: Reality or virtual reality
    • June '05, Ukraine
    • Attfield, P., "Real-world access control systematic failures: Reality or virtual reality, " in Journal Article Workshop, June '05, Ukraine.
    • (2005) Journal Article Workshop
    • Attfield, P.1
  • 24
    • 33846015694 scopus 로고    scopus 로고
    • Seattle FBI briefing: Operation Flyhook
    • April 18, Seattle, WA
    • Schuler, M and P. Attfield. (April 18, 2002). "Seattle FBI briefing: Operation Flyhook, " Boeing Security Forum, Seattle, WA.
    • (2002) Boeing Security Forum
    • Schuler, M.1    Attfield, P.2
  • 25
    • 84866671794 scopus 로고    scopus 로고
    • From Russia with Lopht
    • May 1, 2002. Retrieved August 7, from the World Wide Web
    • Koerner, B. "From Russia with Lopht. " Legal Affairs, May 1, 2002. Retrieved August 7, 2005 from the World Wide Web: http://www.newamerica.net/index.cfm?pg=article&DocID=792
    • (2005) Legal Affairs
    • Koerner, B.1
  • 26
    • 84866643345 scopus 로고    scopus 로고
    • Court proceedings and public-record trial exhibits
    • United States. Department of Justice., WA, September
    • United States. Department of Justice. "Court proceedings and public-record trial exhibits, " United States v. Vasily Gorshkov. Seattle, WA, September 2001.
    • (2001) United States v. Vasily Gorshkov. Seattle
  • 27
    • 84866671789 scopus 로고    scopus 로고
    • Press release: Russian hacker sentenced
    • United States. Department of Justice., NJ, July 25, 2003. Retrieved August 7, from the World Wide Web
    • United States. Department of Justice. "Press release: Russian hacker sentenced. " Newark, NJ, July 25, 2003. Retrieved August 7, 2005 from the World Wide Web: http://www.usdoj.gov/criminal/cybercrime/ivanovSent_NJ.htm
    • (2005) Newark
  • 29
  • 31
    • 1942505732 scopus 로고    scopus 로고
    • Management strategies for implementing forensic security measures
    • [electronic version], June
    • Wolfe-Wilson, J. and Wolfe, H.B. (2003) "Management strategies for implementing forensic security measures "[electronic version]. Information Security Technical Report Volume 8, Issue 2, June 2003, pp.55-64.
    • (2003) Information Security Technical Report , vol.8 , Issue.2 , pp. 55-64
    • Wolfe-Wilson, J.1    Wolfe, H.B.2
  • 32
    • 3042642695 scopus 로고    scopus 로고
    • Getting physical with the digital investigation process
    • 2 [Electronic version] Fall
    • Carrier, B. and Spafford, E. "Getting physical with the digital investigation process, " International Journal of Digital Evidence, vol. 2, 2 [Electronic version] Fall 2003.
    • (2003) International Journal of Digital Evidence , vol.2
    • Carrier, B.1    Spafford, E.2
  • 36
    • 48049123446 scopus 로고    scopus 로고
    • Unit Chief FBI CART (Retired), July 12, Syracuse, New York
    • Pollit, M. Unit Chief FBI CART (Retired), Personal interview, July 12, 2005, Syracuse, New York.
    • (2005) Personal interview
    • Pollit, M.1
  • 37
    • 3042774608 scopus 로고    scopus 로고
    • Building theoretical underpinnings for digital forensics research
    • Issue 1
    • Mocas, S., (2004). "Building theoretical underpinnings for digital forensics research, " Compsec Online: Digital Investigations. Vol. 1, Issue 1.
    • (2004) Compsec Online: Digital Investigations , vol.1
    • Mocas, S.1
  • 38
    • 33845992755 scopus 로고    scopus 로고
    • The future of computer forensics: A needs survey
    • Purdue University, Layfayette, IN
    • Rogers, M. and K. Siegfried. (2003). "The future of computer forensics: A needs survey, " CERIAS Tech Report 2003-30, Purdue University, Layfayette, IN.
    • (2003) CERIAS Tech Report 2003-30
    • Rogers, M.1    Siegfried, K.2
  • 40
    • 4644317619 scopus 로고
    • Information systems security: A comprehensive model
    • th Annual Canadian Computer Security Conference, Ottawa, Ontario, May, 1992; reprinted in DataPro Reports on Information Security, Delran, NJ: McGraw-Hill
    • th Annual Canadian Computer Security Conference, Ottawa, Ontario, May, 1992; reprinted in DataPro Reports on Information Security, Delran, NJ: McGraw-Hill, 1992.
    • (1991) th National Computer Security Conference
    • McCumber, J.1
  • 42
    • 33845978641 scopus 로고    scopus 로고
    • Emerging problems on digital evidence
    • September, University of Idaho, Moscow, ID
    • Sommers, P. "Emerging problems on digital evidence. " Presented at the Computer Forensics Workshop, September, 2002, University of Idaho, Moscow, ID.
    • (2002) Presented at the Computer Forensics Workshop
    • Sommers, P.1
  • 43
    • 85046981963 scopus 로고    scopus 로고
    • New directions in cyber law
    • June, Washington, D. C
    • th Colloquium. June 2003, Washington, D.C.
    • (2003) th Colloquium
    • Ryan, D.1
  • 44
    • 30144433045 scopus 로고    scopus 로고
    • U.S. Department of Commerce, 2004, NIST Special Publication 800-64. Retrieved from the World Wide Web Feb. 17
    • Grance, T., Hash, J. and Stevens M. (2004). "Security considerations in the information system development life cycle. " U.S. Department of Commerce, NIST Special Publication 800-64. Retrieved from the World Wide Web Feb. 17 2007: http://csrc.nist.gov/publications/nistpubs/index.html
    • (2007) Security considerations in the information system development life cycle.
    • Grance, T.1    Hash, J.2    Stevens, M.3
  • 45
    • 48049116152 scopus 로고    scopus 로고
    • Chief Information Security Officer University of Washington, and Winn, J., Director of the Shidler Center for Law Commerce and Technology, University of Washington, Seattle, WA March 31
    • Bailey, K., Chief Information Security Officer University of Washington, and Winn, J., Director of the Shidler Center for Law Commerce and Technology, University of Washington, Personal interviews. Seattle, WA March 31, 2006.
    • (2006) Personal interviews
    • Bailey, K.1
  • 46
    • 48049123446 scopus 로고    scopus 로고
    • Chief Technology Officer, Conjungi Corporation, Conjungi: Seattle, WA, Summer
    • Simon, M. Chief Technology Officer, Conjungi Corporation, Personal interviews. Conjungi: Seattle, WA, Summer, 2005.
    • (2005) Personal interviews
    • Simon, M.1
  • 48
    • 84866658244 scopus 로고    scopus 로고
    • Harcourt Health Sciences
    • Retrieved from the World Wide Web July 31
    • W. B. Saunders Harcourt Health Sciences. "Definition: calibration, " Retrieved from the World Wide Web July 31, 2006. http://www.mercksource.com/pp/us/cns/cns_hl_dorlands.jspzQ zpgzEzzSzppdocszSzuszSzcommonzSzdorlandszSzdorlandzSz dmd_c_03zPzhtm
    • (2006) Definition: Calibration
    • Saunders, W.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.