Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Edith Cowan University

2008

Privacy

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Glenn Dardick, Iain Sutherland Jan 2008

The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Glenn Dardick, Iain Sutherland

Research outputs pre 2011

All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers. Individual home users also increasingly use computers and other devices containing computer hard disks for the storage and processing of information relating to their private, personal affairs. It continues to be clear that the majority of organisations and individual home users still remain ignorant or misinformed of the volume and type of information that is stored on the hard disks that these devices contain …


A Study Into The Forensic Recoverability Of Data From 2nd Hand Blackberry Devices: World-Class Security, Foiled By Humans, Craig Valli, Andrew Jones Jan 2008

A Study Into The Forensic Recoverability Of Data From 2nd Hand Blackberry Devices: World-Class Security, Foiled By Humans, Craig Valli, Andrew Jones

Research outputs pre 2011

Blackberry RIM devices are arguably one of the more secure platforms for email, calendaring and voice. It is one of the few devices in this arena that has approval for carrying restricted security classifications. Blackberry devices do suffer from the same basic fundamental flaw in that they have a human operator. This research was about the blind purchase of Blackberry devices from auctions. Of the 15 Blackberry examined in this study 3 were able to be fully recovered. They all revealed personal and corporate details about the users of the devices.