Computer Forensics: Investigating Wireless Networks And Devices

Computer Forensics: Investigating Wireless Networks And Devices
Tags: EC-Council

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recentreports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better knownas black hats, are preying on information systems of government, corporate, public, and private networks andare constantly testing the security mechanisms of these organizations to the limit with the sole aim of exploitingthem and profiting from the exercise. High-profile crimes have proven that the traditional approach to computersecurity is simply not sufficient, even with the strongest perimeter, properly configured defense mechanisms suchas firewalls, intrusion detection, and prevention systems, strong end-to-end encryption standards, and anti-virussoftware. Hackers have proven their dedication and ability to systematically penetrate networks all over theworld. In some cases, black hats may be able to execute attacks so flawlessly that they can compromise a system,steal everything of value, and completely erase their tracks in less than 20 minutes!