Games Consoles Security and Forensics Challenges

نویسنده

  • Hamid Jahankhani
چکیده

The new generation games consoles have proved that human imagination is unlimited. Millions of kids, teenagers many adults are entertained by these advanced and amazing games. Apart from providing fun to game lovers, these gadgets have also captured the interests of hobbyists, hackers and crackers and cyber criminals. The high processing power and the ease of modification have attracted such users in modifying these devices to do things that the manufacturers never intended. Today Xbox, PlayStation, Wii game consoles and their successors are the most powerful processing devices in a household. Among them Xbox and Xbox 360 have been the mostly modified devices to date. These devices can be hardware and/or software modified to run as personal computers, FTP servers, Web servers, etc. This has led to the rise of an alternate storage device for people cybercriminals to hide their illicit data as suspicion rarely arises of data storage on such devices. This research paper aims to discuss Xbox security and forensics challenges.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preliminary forensic analysis of the Xbox One

Video game consoles can no longer be viewed as just gaming consoles but rather as full multimedia machines, capable of desktop computer-like performance. The past has shown that game consoles have been used in criminal activities such as extortion, identity theft, and child pornography, but with their ever-increasing capabilities, the likelihood of the expansion of criminal activities conducted...

متن کامل

Forensic Analysis of Xbox Consoles

Microsoft’s Xbox game console can be modified to run additional operating systems, enabling it to store gigabytes of non-game related files and run various computer services. Little has been published, however, on procedures for determining whether or not an Xbox console has been modified, for creating a forensic duplicate, and for conducting a forensic investigation. Given the growing populari...

متن کامل

to rs ’ In tr od uc ti on Networked Games in the Midst of the Clouds

Over the past decade, networked games have grown in popularity, catalyzed by the spread of mobile and residential Internet connections with high capacities and low latencies, which encourage game developers to incorporate networked features into their products. Although networked games have demonstrated commercial, artistic, and technical successes, challenges and opportunities remain as comput...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Digital Forensics: Emerging Trends and Analysis of Counter-Security Environment

Corporates and organizations across the globe are spending huge sums on information security as they are reporting an increase in security related incidents. The proliferation of cloud, social network and multiple mobile device usage is on one side represent an opportunity and benefits to the organisation and on other side have posed new challenges for those policing cybercrimes. Cybercriminals...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011