12.IND Lecture Notes - Lecture 10: Forensic Science, Intrusion Detection System, Trade Secret
Document Summary
Types of computer forensics technology: types of military computer forensic technology. Key objectives of cyber forensics include rapid discovery of evidence, estimation of potential impact of the malicious activity on the victim, and assessment of the intent and identity of the perpetrator. Real-time tracking of potentially malicious activity is especially difficult when the pertinent information has been intentionally hidden, destroyed, or modified in order to elude discovery. National law enforcement and corrections technology center (nlectc) works with criminal justice professionals to identify urgent and emerging technology needs. Nlectc centers demonstrate new technologies, test commercially available technologies and publish results linking research and practice. National institute of justice (nij) sponsors research and development or identifies best practices to address those needs. The information directorate entered into a partnership with the nij via the auspices of the nlectc, to test the new ideas and prototype tools. The computer forensics experiment 2000 (cfx-2000) resulted from this partnership.