{"title":"Cyber incident forensics as a forward lean security","authors":"Jooyoung Lee","doi":"10.1109/ICTC.2014.6983317","DOIUrl":null,"url":null,"abstract":"Recently, cyber space is regarded as the second real world connected in real time. Accordingly, the issue related security and incident respond is being magnified in most of ICT dependent industries. However, it's rarely impossible for organizations to perfectly defend cyber-attacks with legacy security solutions. This problem is bringing new challenges to the ICT industries. In this paper, we describe why and how the ICT industries should deal with this problem. And then, we introduce the concept of cyber incident forensics and propose the design of cyber incident forensic system.","PeriodicalId":299228,"journal":{"name":"2014 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Information and Communication Technology Convergence (ICTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTC.2014.6983317","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Recently, cyber space is regarded as the second real world connected in real time. Accordingly, the issue related security and incident respond is being magnified in most of ICT dependent industries. However, it's rarely impossible for organizations to perfectly defend cyber-attacks with legacy security solutions. This problem is bringing new challenges to the ICT industries. In this paper, we describe why and how the ICT industries should deal with this problem. And then, we introduce the concept of cyber incident forensics and propose the design of cyber incident forensic system.