An investigation into a digital forensic model to distinguish between 'insider' and 'outsider'
IT systems are attacked using computers and networks to facilitate their crimes and hide their identities, creating new challenges for corporate security investigations. There are two main types of attacker: insiders and outsiders. Insiders are trusted users who have gained authorised access to an o...
Main Author: | |
---|---|
Published: |
De Montfort University
2010
|
Subjects: | |
Online Access: | http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.530869 |