Page 134 - CFF
P. 134

Network forensic analysis (continued)






         Identifying network outsiders (continued)


         • IP address tracing can be defeated by proxy

             servers or virtual private networks (VPNs) that

             adhere to the following:



            – Pass all data through third-party servers so that IP address will be
                traced to the third-party proxy or VPN server; many proxy servers don’t
                maintain logs or are in practically-out-of-reach foreign countries

            – Readily accessible on the internet

            – Used by sophisticated hackers, cyberthieves, and terrorists, but are
                readily available to anyone with few technology skills






         10   © 2019 Association of International Certified Professional Accountants. All rights reserved.
   129   130   131   132   133   134   135   136   137   138   139