Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

1.1 Introduction - Building upon GhostNet
1.2 About the Shadows in the Cloud Investigation: Beyond GhostNet
1.3 Research Framework
PART 2: Methodology and Investigative Techniques
2.1 Methodology
2.2 Field Investigation
2.3 Technical Investigative Activities
3.1 Analysis of Data while in the Field
3.2 Technical Investigation
3.3 Command and Control Infrastructure
4.1 Compromised Victims: The Evidence
4.2 Victim Analysis on the Basis of Recovered Documents
PART 5: Tackling Cyber Espionage
5.1 Attribution and Cyber Crime / Cyber Espionage
5.3 Notifcation
0 of .
Results for:
No results containing your search query
P. 1
Shadows in the Cloud

Shadows in the Cloud

Ratings: (0)|Views: 11|Likes:
Published by geoff-dudgeon-6701

More info:

Published by: geoff-dudgeon-6701 on Dec 02, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 6 to 58 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->