Forensics 'DUST' For Cyberprints
Source: Lexis-Nexis - Posted by Ryan W. Maple   
Intrusion Detection David Brown reports on advances in forensic science that can catch hackers by their behaviour Experts in forensic computing believe that businesses can help to identify the "signature" techniques of hackers, by monitoring how they behave inside networks, and which . . . David Brown reports on advances in forensic science that can catch hackers by their behaviour Experts in forensic computing believe that businesses can help to identify the "signature" techniques of hackers, by monitoring how they behave inside networks, and which tools they use, increasing the chances of prosecution.

Some IT managers are also considering sharing the information with other companies, so that security systems can be adapted to defend against specific individuals.

Martin Baldock, forensic technology director at KPMG Forensic Accounting, said: "We have been approached by a lot of clients who are interested in finding out more about the signature identification and about sharing information.

Read this full article at Lexis-Nexis

Only registered users can write comments.
Please login or register.

Powered by AkoComment!