Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
0Activity

Table Of Contents

1.1 Introduction - Building upon GhostNet
1.2 About the Shadows in the Cloud Investigation: Beyond GhostNet
1.3 Research Framework
PART 2: Methodology and Investigative Techniques
2.1 Methodology
2.2 Field Investigation
2.3 Technical Investigative Activities
3.1 Analysis of Data while in the Field
3.2 Technical Investigation
3.3 Command and Control Infrastructure
4.1 Compromised Victims: The Evidence
4.2 Victim Analysis on the Basis of Recovered Documents
PART 5: Tackling Cyber Espionage
5.1 Attribution and Cyber Crime / Cyber Espionage
5.3 Notifcation
Glossary
0 of .
Results for:
No results containing your search query
P. 1
Shadows in the Cloud

Shadows in the Cloud

Ratings: (0)|Views: 11|Likes:
Published by geoff-dudgeon-6701

More info:

Published by: geoff-dudgeon-6701 on Dec 02, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/02/2011

pdf

text

original

You're Reading a Free Preview
Pages 6 to 58 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->