A method for designing secure solutions
IBM Systems Journal - End-to-end security
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Computer Forensics and Culture
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.25 |
The increasing use of telecommunications, particularly the development of e-commerce, is steadily increasing the opportunities for crime in many guises, especially IT-related crime. In response, there is an urgent new demand for forensic computing, that is, the examination of IT equipment and systems in order to obtain information for criminal or civil investigations. This field is not yet well developed, but its needs will in the future begin to influence telecommunications as investigations are extended to include the use of the communications infrastructures and services. IT security technologies alone are not sufficient to deal with this. The telecommunications industry, its customers, and regulators will face difficult challenges in the provision and use of systems that will be safe, reliable, and auditable. These challenges will need solutions addressing technical, legal, regulatory, and social issues and will not be easily resolved. This article summarizes the state of forensic computing, its likely future development, and its impact on telecommunications, and identifies several research and development issues.