Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Event category

Content archived on 2022-07-14

Article available in the following languages:

'Cyberforensics 2011 - International conference on cybercrime, security and digital forensics', Glasgow, UK

A conference entitled 'Cyberforensics 2011 - International conference on cybercrime, security and digital forensics' will take place on 27 and 28 June 2011 in Glasgow, UK.

Cybercrime is an area which covers the use of a computer or network for such things as financial scams, ...

27 June 2011 - 27 June 2011
United Kingdom
A conference entitled 'Cyberforensics 2011 - International conference on cybercrime, security and digital forensics' will take place on 27 and 28 June 2011 in Glasgow, UK.

Cybercrime is an area which covers the use of a computer or network for such things as financial scams, computer hacking, virus attacks and information theft. These activities are increasingly common, may originate in any country, and can target individuals or organisations in other parts of the world.

The field of security encompasses all aspects of policy, technical measures and other precautions that seek to protect systems, services and data within an organisation or home context. Digital forensics is the application of analysis and investigation techniques to determine the presence and nature of computer (or technology) based criminal activity.

Specific topics that will be addressed at the conference are set to include:
- cybercrime scenario analysis and reconstruction;
- techniques for evidence collection, search, analysis, correlation and preservation;
- victim profiling;
- monitoring and incident response;
- tools and techniques for network forensics;
- methodologies for digital forensics;
- forensics of mobile and embedded devices;
- forensic software tools and applications;
- attack strategy analysis and modelling;
- privacy, legal and legislation issues;
- forensic-enabled architectures and processes.For further information, please visit: http://www.cyberforensics.org.uk/(opens in new window)
My booklet 0 0