Now showing items 1-1 of 1
An investigation into a digital forensic model to distinguish between “insider” and “outsider”
(De Montfort University, 2010)
IT systems are attacked using computers and networks to facilitate their crimes and hide their identities, creating new challenges for corporate security investigations. There are two main types of attacker: insiders and ...