VoIP and PBX Security and Forensics: PBX Forensics
Androulidakis, Iosif I.
2016-04-26 00:00:00
[Given the increased criminal activity targeting PBXs, it is essential to have an idea about the modus operandi of attackers as well as to be able to understand the forensics procedures involved when analyzing an incident. Specifically for PBXs there exist many commands and tools that can help in the evidence extraction. In this chapter we will analyze the subject of digital evidence from PBXs from both the theoretical and the technical side.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/voip-and-pbx-security-and-forensics-pbx-forensics-kffpEtl0v8
[Given the increased criminal activity targeting PBXs, it is essential to have an idea about the modus operandi of attackers as well as to be able to understand the forensics procedures involved when analyzing an incident. Specifically for PBXs there exist many commands and tools that can help in the evidence extraction. In this chapter we will analyze the subject of digital evidence from PBXs from both the theoretical and the technical side.]
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.