This paper describes an investigation into how an employee using a virtual environment can circumvent any or all of the security, policies and procedures within an organization. The paper discusses the fundamental issues that organizations must address to be able to detect such an attack. Attacks of this nature may be malicious with intent to cause disruption by flooding the network or disabling specific equipment, or non-malicious by quietly gathering critical information such as user names and passwords or a colleague’s internet banking details. Identification of potential residual evidence following an attack is presented. Such evidence may be used to speculate or verify an attack incident occurrence. Additionally, the forensic extractio...
Malware assaults amongst diverse cyber-attack on computers are deemed harmful, as they are passive a...
The advent of virtualization technologies has evolved the IT infrastructure and organizations are mi...
Insider threat detection is a major problem. Studies show that the extent of damage that could be ca...
This paper describes an investigation into how an employee using a virtual environment can circumven...
Necessity is the mother of invention, and necessity has produced many software and hardware tools in...
Although insider attacks have increased rapidly in recent years and cause enormous damages, there ar...
In the recent past machine and application virtualization technologies have received a great attenti...
Purpose: Attempting to get access to a computer, computer network, or computing system without autho...
As data represent a key asset for today\u27s organizations, the problem of how to protect this data ...
In the cyber world more and more cyber-attacks are being perpetrated. Hackers have now become the wa...
Attacks on the organization networks can be classified as external and internal attacks. For the pur...
Many cyber security officers are more concerned with outside rather than insider threats because the...
The insider threat problem is a significant and ever present issue faced by any organisation. While ...
Information is probably the most valuable asset of many people and information systems. However, som...
System administrators use application-level knowledge to identify anomalies in virtual appliances (V...
Malware assaults amongst diverse cyber-attack on computers are deemed harmful, as they are passive a...
The advent of virtualization technologies has evolved the IT infrastructure and organizations are mi...
Insider threat detection is a major problem. Studies show that the extent of damage that could be ca...
This paper describes an investigation into how an employee using a virtual environment can circumven...
Necessity is the mother of invention, and necessity has produced many software and hardware tools in...
Although insider attacks have increased rapidly in recent years and cause enormous damages, there ar...
In the recent past machine and application virtualization technologies have received a great attenti...
Purpose: Attempting to get access to a computer, computer network, or computing system without autho...
As data represent a key asset for today\u27s organizations, the problem of how to protect this data ...
In the cyber world more and more cyber-attacks are being perpetrated. Hackers have now become the wa...
Attacks on the organization networks can be classified as external and internal attacks. For the pur...
Many cyber security officers are more concerned with outside rather than insider threats because the...
The insider threat problem is a significant and ever present issue faced by any organisation. While ...
Information is probably the most valuable asset of many people and information systems. However, som...
System administrators use application-level knowledge to identify anomalies in virtual appliances (V...
Malware assaults amongst diverse cyber-attack on computers are deemed harmful, as they are passive a...
The advent of virtualization technologies has evolved the IT infrastructure and organizations are mi...
Insider threat detection is a major problem. Studies show that the extent of damage that could be ca...