Analysis of Windows Operating Systems in Incident Response Processes in Cyber Wars: Use of Open Source Tools

Analysis of Windows Operating Systems in Incident Response Processes in Cyber Wars: Use of Open Source Tools

Mustafa Bircan, Gurkan Tuna
Copyright: © 2023 |Pages: 25
DOI: 10.4018/978-1-6684-6741-1.ch001
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Although Windows is the most popular operating system in the world, it has many vulnerabilities, depending on its version. Due to these vulnerabilities, attackers can capture sensitive data and cause irreversible damage. Examination of these vulnerabilities and analysis of malicious codes can be done with open-source tools. Analyzing affected services in a cyber war is important to prevent the future attacks and prevent data breaches. Because, in every attack and every data breach, a trace is definitely left by the attacker(s). These traces help us identify the culprit and the magnitude of the violation committed. In this study, open-source software tools that can be used in incident response process in Windows operating systems are reviewed. As it is shown, when such tools are used appropriately and timely, they can reduce the impacts of cyber attacks and help to prevent future cyber attacks.
Chapter Preview
Top

Computer Forensics And Open-Source Software Tools

Computer forensics consists of the application of computer investigation and analysis techniques in order to determine the legally required evidence after an event enters the judicial process. It focuses on the extraction of digital evidence in various types of information (i.e., audio, data, images or a combination of them) either hosted in a server or transmitted via computer networks (Casey, 2010). Here, the main aim is to identify, acquire, examine, and appropriately store digital evidence, and then report the results, so that it can be presented to the court (Şirikçi & Cantürk, 2013).

Key Terms in this Chapter

Incident Response: An organized approach to addressing and managing the aftermath of a cyberattack

File System: Data structure used by the operating system to control how data is stored and retrieved.

Open Source Software: Software delivered with its source code so that anyone can inspect, modify, and enhance it.

Cyber War: The use of cyber attacks against an enemy state or an instituion with the aim of causing harm to actual warfare and/or disrupting critical computer systems.

Complete Chapter List

Search this Book:
Reset