{"title":"传感器网络中的安全问题和网络取证中可采证据的收集","authors":"J. Nehinbe, Peter Damuut","doi":"10.1109/EMS.2011.95","DOIUrl":null,"url":null,"abstract":"The scope of information security is becoming wider everyday due to new and emerging dimensions in the evolution of computer applications with the intention to lessen manual operations. These have necessitated the needs to manufacture portable and smart devices that can be interconnected to the Internet for home and industrial usages and for environmental surveillance. Consequently, global and national regulatory laws and statutes aimed at addressing illegal activities committed across computer and sensor networks are also increasing. Nevertheless, there are incessant cases of abuse through information leakage, masquerading, telephone hacking and password cracking that are perpetrated by some users of these technologies. Thus, this paper critically describes and analyses emerging security challenges in the investigation of smart devices that interface with computer systems. The review will be functionally useful to researchers, vendors, security professionals and IT end users in general.","PeriodicalId":131364,"journal":{"name":"2011 UKSim 5th European Symposium on Computer Modeling and Simulation","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Security issues in Sensor Networks and gathering admissible evidence in Network Forensics\",\"authors\":\"J. Nehinbe, Peter Damuut\",\"doi\":\"10.1109/EMS.2011.95\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The scope of information security is becoming wider everyday due to new and emerging dimensions in the evolution of computer applications with the intention to lessen manual operations. These have necessitated the needs to manufacture portable and smart devices that can be interconnected to the Internet for home and industrial usages and for environmental surveillance. Consequently, global and national regulatory laws and statutes aimed at addressing illegal activities committed across computer and sensor networks are also increasing. Nevertheless, there are incessant cases of abuse through information leakage, masquerading, telephone hacking and password cracking that are perpetrated by some users of these technologies. Thus, this paper critically describes and analyses emerging security challenges in the investigation of smart devices that interface with computer systems. The review will be functionally useful to researchers, vendors, security professionals and IT end users in general.\",\"PeriodicalId\":131364,\"journal\":{\"name\":\"2011 UKSim 5th European Symposium on Computer Modeling and Simulation\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-11-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 UKSim 5th European Symposium on Computer Modeling and Simulation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EMS.2011.95\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 UKSim 5th European Symposium on Computer Modeling and Simulation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EMS.2011.95","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security issues in Sensor Networks and gathering admissible evidence in Network Forensics
The scope of information security is becoming wider everyday due to new and emerging dimensions in the evolution of computer applications with the intention to lessen manual operations. These have necessitated the needs to manufacture portable and smart devices that can be interconnected to the Internet for home and industrial usages and for environmental surveillance. Consequently, global and national regulatory laws and statutes aimed at addressing illegal activities committed across computer and sensor networks are also increasing. Nevertheless, there are incessant cases of abuse through information leakage, masquerading, telephone hacking and password cracking that are perpetrated by some users of these technologies. Thus, this paper critically describes and analyses emerging security challenges in the investigation of smart devices that interface with computer systems. The review will be functionally useful to researchers, vendors, security professionals and IT end users in general.