Page 134 - CFF
P. 134
Network forensic analysis (continued)
Identifying network outsiders (continued)
• IP address tracing can be defeated by proxy
servers or virtual private networks (VPNs) that
adhere to the following:
– Pass all data through third-party servers so that IP address will be
traced to the third-party proxy or VPN server; many proxy servers don’t
maintain logs or are in practically-out-of-reach foreign countries
– Readily accessible on the internet
– Used by sophisticated hackers, cyberthieves, and terrorists, but are
readily available to anyone with few technology skills
10 © 2019 Association of International Certified Professional Accountants. All rights reserved.