12.IND Lecture Notes - Lecture 10: Forensic Science, Intrusion Detection System, Trade Secret

85 views11 pages

Document Summary

Types of computer forensics technology: types of military computer forensic technology. Key objectives of cyber forensics include rapid discovery of evidence, estimation of potential impact of the malicious activity on the victim, and assessment of the intent and identity of the perpetrator. Real-time tracking of potentially malicious activity is especially difficult when the pertinent information has been intentionally hidden, destroyed, or modified in order to elude discovery. National law enforcement and corrections technology center (nlectc) works with criminal justice professionals to identify urgent and emerging technology needs. Nlectc centers demonstrate new technologies, test commercially available technologies and publish results linking research and practice. National institute of justice (nij) sponsors research and development or identifies best practices to address those needs. The information directorate entered into a partnership with the nij via the auspices of the nlectc, to test the new ideas and prototype tools. The computer forensics experiment 2000 (cfx-2000) resulted from this partnership.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers