期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Comparative Study of Email Forensic Tools
1
作者 Vamshee Krishna Devendran Hossain Shahriar victor clincy 《Journal of Information Security》 2015年第2期111-117,共7页
Over the last decades, email has been the major carrier for transporting spam and malicious contents over the network. Email is also the primary source of numerous criminal activities on the Internet. Computer Forensi... Over the last decades, email has been the major carrier for transporting spam and malicious contents over the network. Email is also the primary source of numerous criminal activities on the Internet. Computer Forensics is a systematic process to retain and analyze saved emails for the purpose of legal proceedings and other civil matters. Email analysis is challenging due to not only various fields that can be forged by hackers or malicious users, but also the flexibility of composing, editing, deleting of emails using offline (e.g., MS Outlook) or online (e.g., Web mail) email applications. Towards this direction, a number of open source forensics tools have been widely used by the practitioners. However, these tools have been developed in an isolated manner rather than a collaborative approach. Given that email forensic tool users need to understand to what extent a tool would be useful for his/her circumstances and conducting forensic analysis accordingly. In this paper, we examine a set of common features to compare and contrast five popular open source email forensic tools. The study finds that all email forensic tools are not similar, offer diverse types of facility. By combining analysis tools, it may be possible to gain detailed information in the area of email forensic. 展开更多
关键词 EMAIL Forensic HEADER and Content Analysis Data Recovery SEARCH OPTION VISUALIZATION
下载PDF
Mobile Phishing Attacks and Mitigation Techniques
2
作者 Hossain Shahriar Tulin Klintic victor clincy 《Journal of Information Security》 2015年第3期206-212,共7页
Mobile devices have taken an essential role in the portable computer world. Portability, small screen size, and lower cost of production make these devices popular replacements for desktop and laptop computers for man... Mobile devices have taken an essential role in the portable computer world. Portability, small screen size, and lower cost of production make these devices popular replacements for desktop and laptop computers for many daily tasks, such as surfing on the Internet, playing games, and shopping online. The popularity of mobile devices such as tablets and smart phones has made them a frequent target of traditional web-based attacks, especially phishing. Mobile device-based phishing takes its share of the pie to trick users into entering their credentials in fake websites or fake mobile applications. This paper discusses various phishing attacks using mobile devices followed by some discussion on countermeasures. The discussion is intended to bring more awareness to emerging mobile device-based phishing attacks. 展开更多
关键词 MOBILE APPLICATION PHISHING Smishing Vishing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部