Games Consoles Security and Forensics Challenges
نویسنده
چکیده
The new generation games consoles have proved that human imagination is unlimited. Millions of kids, teenagers many adults are entertained by these advanced and amazing games. Apart from providing fun to game lovers, these gadgets have also captured the interests of hobbyists, hackers and crackers and cyber criminals. The high processing power and the ease of modification have attracted such users in modifying these devices to do things that the manufacturers never intended. Today Xbox, PlayStation, Wii game consoles and their successors are the most powerful processing devices in a household. Among them Xbox and Xbox 360 have been the mostly modified devices to date. These devices can be hardware and/or software modified to run as personal computers, FTP servers, Web servers, etc. This has led to the rise of an alternate storage device for people cybercriminals to hide their illicit data as suspicion rarely arises of data storage on such devices. This research paper aims to discuss Xbox security and forensics challenges.
منابع مشابه
Preliminary forensic analysis of the Xbox One
Video game consoles can no longer be viewed as just gaming consoles but rather as full multimedia machines, capable of desktop computer-like performance. The past has shown that game consoles have been used in criminal activities such as extortion, identity theft, and child pornography, but with their ever-increasing capabilities, the likelihood of the expansion of criminal activities conducted...
متن کاملForensic Analysis of Xbox Consoles
Microsoft’s Xbox game console can be modified to run additional operating systems, enabling it to store gigabytes of non-game related files and run various computer services. Little has been published, however, on procedures for determining whether or not an Xbox console has been modified, for creating a forensic duplicate, and for conducting a forensic investigation. Given the growing populari...
متن کاملto rs ’ In tr od uc ti on Networked Games in the Midst of the Clouds
Over the past decade, networked games have grown in popularity, catalyzed by the spread of mobile and residential Internet connections with high capacities and low latencies, which encourage game developers to incorporate networked features into their products. Although networked games have demonstrated commercial, artistic, and technical successes, challenges and opportunities remain as comput...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملDigital Forensics: Emerging Trends and Analysis of Counter-Security Environment
Corporates and organizations across the globe are spending huge sums on information security as they are reporting an increase in security related incidents. The proliferation of cloud, social network and multiple mobile device usage is on one side represent an opportunity and benefits to the organisation and on other side have posed new challenges for those policing cybercrimes. Cybercriminals...
متن کامل