作者: Benjamin Turnbull , Jill Slay
关键词:
摘要: 802.11-based wireless networking has significantly altered the means and topology for cities, offices, homes coffee shops over last five years. A second generation of devices extended what was once a computer-to-computer protocol into area embedded functional devices. Accompanying this widespread usage is presence crime; more popular technology, opportunity exists its misuse. This work studies environment from forensic computing perspective. It seeks to understand current state misuse: present misuses; potential forms misuse involving networks; tools techniques used in identification, containment analysis. The research highlights lack procedures investigations that are able effectively handle networks, there may escape detection by investigation teams.