Paper
18 February 2014 Conception of a course for professional training and education in the field of computer and mobile forensics, part III: network forensics and penetration testing
Knut Kröger, Reiner Creutzburg
Author Affiliations +
Proceedings Volume 9030, Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014; 903002 (2014) https://doi.org/10.1117/12.2037016
Event: IS&T/SPIE Electronic Imaging, 2014, San Francisco, California, United States
Abstract
IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data make it necessary to further train the own employees in the field of network forensics and penetration testing. Motivated by these facts, this paper - a continuation of a paper of January 2012 [1], which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses the practical implementation important relationships of network forensic and penetration testing.
© (2014) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Knut Kröger and Reiner Creutzburg "Conception of a course for professional training and education in the field of computer and mobile forensics, part III: network forensics and penetration testing", Proc. SPIE 9030, Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014, 903002 (18 February 2014); https://doi.org/10.1117/12.2037016
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Forensic science

Information technology

Digital forensics

Databases

Network security

Actinium

Computer networks

Back to Top