Analysis of windows operating systems in incident response processes in cyber wars: Use of open source tools

dc.authorscopusid58173122200
dc.authorscopusid48862103700
dc.contributor.authorBircan M.
dc.contributor.authorTuna G.
dc.date.accessioned2024-06-12T10:26:14Z
dc.date.available2024-06-12T10:26:14Z
dc.date.issued2023
dc.description.abstractAlthough Windows is the most popular operating system in the world, it has many vulnerabilities, depending on its version. Due to these vulnerabilities, attackers can capture sensitive data and cause irreversible damage. Examination of these vulnerabilities and analysis of malicious codes can be done with open-source tools. Analyzing affected services in a cyber war is important to prevent the future attacks and prevent data breaches. Because, in every attack and every data breach, a trace is definitely left by the attacker(s). These traces help us identify the culprit and the magnitude of the violation committed. In this study, open-source software tools that can be used in incident response process in Windows operating systems are reviewed. As it is shown, when such tools are used appropriately and timely, they can reduce the impacts of cyber attacks and help to prevent future cyber attacks. © 2023, IGI Global. All rights reserved.en_US
dc.identifier.doi10.4018/978-1-6684-6741-1.ch001
dc.identifier.endpage25en_US
dc.identifier.isbn9781668467428
dc.identifier.isbn1668467410
dc.identifier.isbn9781668467411
dc.identifier.scopus2-s2.0-85151896758en_US
dc.identifier.scopusqualityN/Aen_US
dc.identifier.startpage1en_US
dc.identifier.urihttps://doi.org/10.4018/978-1-6684-6741-1.ch001
dc.identifier.urihttps://hdl.handle.net/20.500.14551/16737
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherIGI Globalen_US
dc.relation.ispartofHandbook of Research on War Policies, Strategies, and Cyber Warsen_US
dc.relation.publicationcategoryKitap Bölümü - Uluslararasıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subject[Abstarct Not Available]en_US
dc.titleAnalysis of windows operating systems in incident response processes in cyber wars: Use of open source toolsen_US
dc.typeBook Chapteren_US

Dosyalar