Know Your Enemy: A Forensic Analysis
Source: Security Focus - Posted by LinuxSecurity.com Team   
Intrusion Detection This paper, the fourth of the series, studies step by step a successful attack of a system. However, instead of focusing on the tools and tactics used, we will focus on how we learned what happened and pieced the information . . . This paper, the fourth of the series, studies step by step a successful attack of a system. However, instead of focusing on the tools and tactics used, we will focus on how we learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn on your own the threats your organization faces.

Read this full article at Security Focus

Only registered users can write comments.
Please login or register.

Powered by AkoComment!