Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Analyzing Intrusions and Intruders

Type
Video
Tags
forensic, IDS
Authors
Sean M. Bodmer
Event
PhreakNIC 11
Indexed on
Mar 26, 2013

Intrustion analysis has been primarily reserved for network junkies and bit biters. However, due to the advances in network systems automation we now have time to pay more attention to the subtle observations left by attackers at the scene of the incident. Century old sciences have enabled criminal investigators the ability to attribute attacks to specific individuals or groups. Intrusion Analysis and Criminal Sciences can be combined to learn more about the cyber threats slipping into your systems. You will walk away from this talk with a better understanding of how to approach and intrusion and analyze more than just the minutia. I will attempt to convey processes and procedures that you can implement in your Security Program that supports a deeper approach to Intrusion Analysis and Attacker Characterization.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !