Digital Forensics How to Counterattack Hackers Motive
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2020, Vol 4, Issue 6
Abstract
As we all know security over internet is a big issue due to various loopholes in the system. The system hackers usually checks for these loopholes and once they are aware of it exploiting it brutally would be a child’s play for any smart advanced hacker. The only way to avoid these is to understand the hacker’s real motive and plans so that counterattacking can be carried out to safeguard the system. This paper would talk about various digital forensic strategies to counterattack the hackers if any suspicious activities are found out. Rohit Vijaykumar Menon "Digital Forensics: How to Counterattack Hackers Motive" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33415.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/33415/digital-forensics-how-to-counterattack-hackers-motive/rohit-vijaykumar-menon
Authors and Affiliations
Rohit Vijaykumar Menon
Literature Survey on Underwater Image Enhancement
Underwater image enhancement is a challenging task and has gained priority in recent years, as the human eye cannot clearly perceive underwater images. We introduce an effective technique to develop the images captured u...
Optimization of Cutting Parameters in CNC Turning of AISI 304 & AISI 316 Stainless Steel
This paper deals with finding optimal cutting parameters to get the better surface finish. It uses Taguchi method of experiments in arriving at optimal cutting speed, feed rate and depth of cut on turning operation. Turn...
Monitoring and Controlling Device for Smart Greenhouse by using Thinger.io IoT Server
Smart greenhouse system will be convenient way to get the data from greenhouse. IoT will provide all work done and information update and current status of the greenhouse to the person from anywhere and at anytime. Green...
Ecosystem of Virtualization Technologies
Virtualization technology, which forms the infrastructure of data centers and cloud technology, is constantly evolving. The process that started with machine virtualization has turned into taking applications into contai...
Conceptual Study of Mobile Forensics
The use of digital devices in day to day life has increased tremendously. Mobile devices have become an vital part of our day to day routine and they are prone to facilitating illegal activity or otherwise being involved...