- Mar 23, 2015
- 555
Hi, I need your help here.
Recently, I participate a volunteer research project (everyone in my institute should participate at least one of such projects). In the project, the task assigned to me is to list some (the more, the better) modern techniques and utilities (network utilities, security softwares, etc) that can be used by the police and/or government to detect/prevent the crimes in the cyber space. For each technique/utility, we only need to provide a short introduction of 1~2 sentences (I do not need to write a long article).
I should say I am not familiar with this area, but I believe some members here should be experts in this field. I would appreciate it if you could provide me any materials (research papers/new reports/blogs/forum posts) on this topic. Thanks.
P.S. As mentioned in What is Cyber Crime? , cyber crimes have the following three forms:
Furthermore, I need to find some detailed techniques/utilities, not general concepts. For example, Instruction Detection System (IDS) is more like a "general concept", while using the program "tcpdump" to classify packets is more like a "detailed" technique that can be used by IDS (described in wiki).
Both proactive tools and passive tools would be acceptable.
Thanks!
Recently, I participate a volunteer research project (everyone in my institute should participate at least one of such projects). In the project, the task assigned to me is to list some (the more, the better) modern techniques and utilities (network utilities, security softwares, etc) that can be used by the police and/or government to detect/prevent the crimes in the cyber space. For each technique/utility, we only need to provide a short introduction of 1~2 sentences (I do not need to write a long article).
I should say I am not familiar with this area, but I believe some members here should be experts in this field. I would appreciate it if you could provide me any materials (research papers/new reports/blogs/forum posts) on this topic. Thanks.
P.S. As mentioned in What is Cyber Crime? , cyber crimes have the following three forms:
- The computer as a target - attacking the computers of others (spreading viruses is an example).
- The computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world (such as fraud or illegal gambling).
- The computer as an accessory - using a computer as a "fancy filing cabinet" to store illegal or stolen information.
Furthermore, I need to find some detailed techniques/utilities, not general concepts. For example, Instruction Detection System (IDS) is more like a "general concept", while using the program "tcpdump" to classify packets is more like a "detailed" technique that can be used by IDS (described in wiki).
Both proactive tools and passive tools would be acceptable.
Thanks!
Last edited: