Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 39 of 39

Full-Text Articles in Computer Engineering

Network And Database Security: Regulatory Compliance, Network, And Database Security - A Unified Process And Goal, Errol A. Blake Jan 2007

Network And Database Security: Regulatory Compliance, Network, And Database Security - A Unified Process And Goal, Errol A. Blake

Journal of Digital Forensics, Security and Law

Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role …


Table Of Contents Jan 2007

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Jan 2007

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


A Grounded Theory Approach To Identifying And Measuring Forensic Data Acquisition Tasks, Gregory H. Carlton Jan 2007

A Grounded Theory Approach To Identifying And Measuring Forensic Data Acquisition Tasks, Gregory H. Carlton

Journal of Digital Forensics, Security and Law

As a relatively new field of study, little empirical research has been conducted pertaining to computer forensics. This lack of empirical research contributes to problems for practitioners and academics alike.

For the community of practitioners, problems arise from the dilemma of applying scientific methods to legal matters based on anecdotal training methods, and the academic community is hampered by a lack of theory in this evolving field. A research study utilizing a multi-method approach to identify and measure tasks practitioners perform during forensic data acquisitions and lay a foundation for academic theory development was conducted in 2006 in conjunction with …


Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information As Digital Evidence, Nikica Budimir, Jill Slay Jan 2007

Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information As Digital Evidence, Nikica Budimir, Jill Slay

Journal of Digital Forensics, Security and Law

The research reported in this paper introduces new techniques to aid in the identification of recovered notebook computers so they may be returned to the rightful owner. We identify non-volatile data storage areas as a means of facilitating the safe storing of computer identification information. A forensic proof of concept tool has been designed to test the feasibility of several storage locations identified within this work to hold the data needed to uniquely identify a computer. The tool was used to perform the creation and extraction of created information in order to allow the analysis of the non-volatile storage locations …


Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler Jan 2007

Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This is the Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).


Book Review: Computer Forensics: Principles And Practices, Gary C. Kessler Jan 2007

Book Review: Computer Forensics: Principles And Practices, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This issue presents the third Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).


Table Of Contents Jan 2007

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Jan 2007

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.