Main topic: Cybercrime, security of computer network.
PUBLISHED: 09.03.2010
6) Interview with Karel Kuchařík
Karel Kuchařík is currently the head of the Cybercrime Department of the Criminal Police and Investigation Service of the Police of the Czech Republic.
11) Forensic Investigation of Live Systems
Eva Racková
The forensic analysis of live (running) systems is a newly emerging discipline of forensic investigation. This article describes the basic principles and procedures involved in this field.
14) Issues Related to the Prosecution of Computer Crime
Vladimír Smejkal
The new penal code creates good opportunities to prosecute practically all forms of computer crime. Jurisdiction and evidence gathering issues for cross-border crime, especially involving the Internet still remain a problem. Investigations themselves also involve a number of issues: time authenticity, data readability (breaching protection rights), the identification and authentication of activities on a computer and the conclusivity of evidence in relation to the procedures used by experts. The author believes that the way to increased prosecution efficiency can be found in international treaties on cybercrime and the rigorous application of the appropriate methodologies.
20) Digital Forensic Analysis and Information Security
Marián Svetlík
The first part of this article describes the basic properties of digital forensic analysis and uses many practical examples to demonstrate how these properties are not being adhered to. The second part of the article describes the position and practical application of digital forensic analysis in the area of information security, specifically as part of responses to security incidents.
24) Digital Evidence and its Properties
Roman Rak
The term digital evidence is relatively new but has become a key element in forensic sciences. This article defines the term and analyzes its characteristics. Each characteristic has a description including the positive and negative aspects of its use in forensic practice.
28) New Concepts of IDS for Wireless
Andriy Stetsko
Networks This article provides an introduction to wireless sensor networks, the principles of their functioning and attacks on these networks together with protection mechanisms. Concepts for intrusion detection systems for these networks are discussed in more detail. The article also explains why intrusion detection systems for traditional metallic networks cannot be used for wireless sensor networks.
34) IDS – Anomaly Detection Methods
Vítězslav Čížek, Kateřina Dufková
This article deals with methods of detecting statistical anomalies that can be used in IDS. It starts with an overview of the models of legal behavior of systems. The basic algorithms for analyzing short sequences of system calls are then demonstrated using an example.
38) NetFlow – Part I
Josef Kaderka
NetFlow protocol is widely used by ISPs both for routine traffic monitoring and for calculating charges for transferred data. NetFlow protocol options are much richer and can be used for security purposes, especially when the data is obtained through the probe. This article is the first of two parts and provides general information about the NetFlow protocol.
40) The Way to Fibre Channel over Ethernet (FCoE)
Helena Jetelová
This article describes the benefits of consolidating the inputs and outputs of servers in data centres using FCoE technology. Special attention is paid to explaining new performance and security mechanisms.
44) Fibre Channel over Ethernet (FCoE) Security
Jaroslav Dočkal
This article explains why Fibre Channel (FC) technology has been selected as the basis for FCoE network security, the security standard which had to be quickly defined and the documents it had to be incorporated into. It also evaluates the security mechanisms used and draws attention to their weaknesses.