检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]南京市公安局网络安全保卫支队,江苏南京210005
出 处:《信息网络安全》2011年第11期87-90,共4页Netinfo Security
摘 要:为了提高电子证据勘查取证水平,有效打击网站入侵案件,笔者通过模拟网络环境对常见网站入侵方式进行研究,同时也对近两年侦办的网站入侵案件进行了分析。文章阐述了在网站入侵案件中电子证据现场勘查需要重点勘查服务器日志、网站日志、木马文件、特殊目录下的特殊文件等日志和文件,需要提取、固定IP地址、用户名、计算机名称、虚拟身份、入侵工具、木马等重要证据,并结合两个实际案例进行深入分析。In order to improve the capability of investigating digital evidence and counter-attacking such illegal invasions,the writer imitates a network and does research on common network invasions on the basis of well-grounded analysis of the cases involved in illegal network invasions the writer once participated in detecting in these two years.After exploring such illegal network invasions,the writer proposes,in the dissertation,that much attention should be posed to the server logs,website logs,the Trojan horse files,Special file of special directory,logs and files in exceptional lists.Some important evidence,such as IP,the names of users,the names of the computers,Virtual identity,the ways of invasions,the Trojan horse files,and so on,must be extracted and fixed.Furthermore,the writer,in this dissertation,also illustrates and exemplifies such conclusions based on the two real cyber crimes.
分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.129.22.159