Identification of Computers and IP Addresses
Regardless of whether an attack on IT systems comes from the internetInternet or from within the company, it is necessary to identify an attacker to prevent further attacks or to hold the attacker accountable. The same applies, of course, to other forms of computer crime. The chapter shows how speci...
Saved in:
Published in | Data Security pp. 77 - 79 |
---|---|
Main Author | |
Format | Book Chapter |
Language | English |
Published |
Germany
Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH
2022
Springer Fachmedien Wiesbaden |
Online Access | Get full text |
Cover
Loading…
Summary: | Regardless of whether an attack on IT systems comes from the internetInternet or from within the company, it is necessary to identify an attacker to prevent further attacks or to hold the attacker accountable. The same applies, of course, to other forms of computer crime. The chapter shows how specific computers can be found, how the connections used by criminals can be identified, and how the personal details of a criminal can theoretically be determined via an entry in a routerRouters. |
---|---|
ISBN: | 9783658354930 3658354933 |
DOI: | 10.1007/978-3-658-35494-7_15 |