Digital forensic investigation method for identification and analysis of malicious software on linux system
Malware (malicious software) has become the most serious security threats on the internet. There is a malware that is created to provide remote access to the victim computer by bypassing normal authentication known as backdoor. Criminals are making extensive use of backdoor to control computers and steal confidential or proprietary information. The information can be used to commit fraud, identity theft, or can be sold or traded to others. Therefore, forensic investigator need to have suitable methodology to identify and analyze a computer that is compromised by malware. This study aimed to identify artifacts or digital trail that can be potentially as evidence that may be left by the backdoor installed on a victim's computer. The final results of this study will be used as a guide or user manual for law enforcement officers in conducting searches of digital evidence, especially on an infected computer.
M00283 | (Rack Thesis) | Available |
No other version available