An investigation into a digital forensic model to distinguish between 'insider' and 'outsider'

IT systems are attacked using computers and networks to facilitate their crimes and hide their identities, creating new challenges for corporate security investigations. There are two main types of attacker: insiders and outsiders. Insiders are trusted users who have gained authorised access to an o...

Full description

Bibliographic Details
Main Author: Al-Morjan, Abdulrazaq Abdulaziz
Published: De Montfort University 2010
Subjects:
600
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.530869