Digital Forensics

In Wolff Heintschel von Heinegg, Robert Frau & Tassilo Singer (eds.), Dehumanization of Warfare: Legal Implications of New Weapon Technologies. Springer Verlag. pp. 129-145 (2018)
  Copy   BIBTEX

Abstract

In recent years, digital attacks against organizations, critical infrastructure and military targets are increasing. Generally, these attacks are summarized under the term Cyberwar and broadly discussed by the press, military experts and politicians. Attribution is often a major question in these discussions. But, by using computers and the Internet, these attacks leave digital traces which may become digital evidence. Digital forensics as a scientific discipline deals with methodologies to find and handle digital evidence. The main goal of digital forensic investigations is to reconstruct how an attack occurred and who is responsible. In this paper we show up the fundamental principles of digital forensics and discuss the usefulness of digital evidence in the mentioned attack scenarios. By sketching out two concrete examples, we present the capabilities of digital forensics to investigate distributed denial of service attacks and malware attacks.

Other Versions

No versions found

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 101,505

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Digital Face Forgery and the Role of Digital Forensics.Manotar Tampubolon - 2024 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 37 (3):753-767.
From Fingers to Faces: Visual Semiotics and Digital Forensics.Massimo Leone - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 34 (2):579-599.

Analytics

Added to PP
2020-06-17

Downloads
9 (#1,526,266)

6 months
3 (#1,473,720)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references