Identification of Computers and IP Addresses

Regardless of whether an attack on IT systems comes from the internetInternet or from within the company, it is necessary to identify an attacker to prevent further attacks or to hold the attacker accountable. The same applies, of course, to other forms of computer crime. The chapter shows how speci...

Full description

Saved in:
Bibliographic Details
Published inData Security pp. 77 - 79
Main Author Lenhard, Thomas H
Format Book Chapter
LanguageEnglish
Published Germany Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH 2022
Springer Fachmedien Wiesbaden
Online AccessGet full text

Cover

Loading…
More Information
Summary:Regardless of whether an attack on IT systems comes from the internetInternet or from within the company, it is necessary to identify an attacker to prevent further attacks or to hold the attacker accountable. The same applies, of course, to other forms of computer crime. The chapter shows how specific computers can be found, how the connections used by criminals can be identified, and how the personal details of a criminal can theoretically be determined via an entry in a routerRouters.
ISBN:9783658354930
3658354933
DOI:10.1007/978-3-658-35494-7_15