An analysis of forensics evidence gathering for assistance in network intruder prosecution

Download
Author
Kirtley, Steven W.
Date
1999-06Advisor
Syed R. Ali
Daniel F. Warren.
Metadata
Show full item recordAbstract
This research develops a roadmap of legal evidence-gathering steps to assist law enforcement agencies in the identification of network intruders. This checklist will not only assist administrators in conducting network defense and safeguarding evidence but will assist them in remaining within the guidelines of the law in their network defense efforts. Legal responsibilities of network managers are highlighted with respect to legal document requirements and issues of U. S. Marine Corps liability. The aforementioned roadmap development is achieved by: 1) examining the latest advances and trends in network intrusion techniques, 2) investigating current U.S. Navy and U.S. Marine Corps Computer Network Incident Response Policies, 3) researching the current and proposed legislation covering the issue of forensic evidence requirements and preservation, and 4) examining forensics evidence gathering techniques with a focus on individual privacy rights.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Homeland Security Affairs Journal, Volume II - 2006: Issue 2, July
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ... -
Machine Learning Techniques for Identifying Anomalous Network Traffic
Garza, Victor R.; Wood, Brian P.; Monaco, John V.; Blockmon, Ray; Males, Nathaniel; Niemann, Natasha; Ross, John (Monterey, California. Naval Postgraduate School, 2020-10-14); NRP-20-N033ACyber investigations often involve analysis of large volumes of log files, including network flow data. Machine learning (ML) techniques allow analysts and examiners to more quickly identify traffic flows relevant to the ... -
Social network analysis of German foreign fighters in Syria and Iraq
Reynolds, Sean C.; Hafez, Mohammed M. (Routledge Taylor & Francis Group, LLC, 2017);Why do Westerners become foreign fighters in civil conflicts? We explore this question through original data collection on German foreign fighters in Syria and Iraq, and test three sets of hypotheses that revolve around ...