Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Physical Sciences and Mathematics
Automated Data Type Identification And Localization Using Statistical Analysis Data Identification, Sarah Jean Moody
Automated Data Type Identification And Localization Using Statistical Analysis Data Identification, Sarah Jean Moody
All Graduate Theses and Dissertations, Spring 1920 to Summer 2023
This research presents a new and unique technique called SÁDI, statistical analysis data identification, for identifying the type of data on a digital device and its storage format based on data type, specifically the values of the bytes representing the data being examined. This research incorporates the automation required for specialized data identification tools to be useful and applicable in real-world applications. The SÁDI technique utilizes the byte values of the data stored on a digital storage device in such a way that the accuracy of the technique does not rely solely on the potentially misleading metadata information but rather …
Virtual Environments Support Insider Security Violations, Iain Swanson, Patricia A.H. Williams
Virtual Environments Support Insider Security Violations, Iain Swanson, Patricia A.H. Williams
Australian Digital Forensics Conference
This paper describes an investigation into how an employee using a virtual environment can circumvent any or all of the security, policies and procedures within an organization. The paper discusses the fundamental issues that organizations must address to be able to detect such an attack. Attacks of this nature may be malicious with intent to cause disruption by flooding the network or disabling specific equipment, or non-malicious by quietly gathering critical information such as user names and passwords or a colleague’s internet banking details. Identification of potential residual evidence following an attack is presented. Such evidence may be used to …
The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland
The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland
Journal of Digital Forensics, Security and Law
All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers. Individual home users also increasingly use computers and other devices containing computer hard disks for the storage and processing of information relating to their private, personal affairs. It continues to be clear that the majority of organisations and individual home users still remain ignorant or misinformed of the volume and type of information that is stored on the hard disks that these devices contain …
The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Glenn Dardick, Iain Sutherland
The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Glenn Dardick, Iain Sutherland
Research outputs pre 2011
All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers. Individual home users also increasingly use computers and other devices containing computer hard disks for the storage and processing of information relating to their private, personal affairs. It continues to be clear that the majority of organisations and individual home users still remain ignorant or misinformed of the volume and type of information that is stored on the hard disks that these devices contain …
Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler
Book Review: Mac Os X, Ipod, And Iphone Forensic Analysis Dvd Toolkit, Gary C. Kessler
Publications
This document is Dr. Kessler's review of MAC OS X, iPod, and iPhone Forensic Analysis DVD Toolkit, edited by Jesse Varsalone. Syngress, 2009. ISBN: 978-1-59749-297-3.
Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler
Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler
Publications
This document is Dr. Kessler's review of Challenges to Digital Forensic Evidence, by Fred Cohen. Fred Cohen & Associates, 2008. ISBN 1-878109-41-3
A Study Of Wireless Security Privacy And Forensics, Demetrios Roubos, Shawn Casler, James Hedigan, Ryan Shaw, Ajantha Herath, Suvineetha Herath, David D. Costantino, Vincent Cicirello, Robert L. Kachur
A Study Of Wireless Security Privacy And Forensics, Demetrios Roubos, Shawn Casler, James Hedigan, Ryan Shaw, Ajantha Herath, Suvineetha Herath, David D. Costantino, Vincent Cicirello, Robert L. Kachur
David D Costantino
Wireless networking has become an extremely common household technology in a matter of only a few years. Concerns for privacy have become more relevant than ever, with more cases of identity and data theft occurring everyday. Initially, consumer grade wireless technology was distributed without security being a major concern. Today, almost every consumer grade wireless router comes with either “out-of-the-box” encryption or with relatively easy to follow instructions on how to properly secure the household wireless infrastructure. In this paper we investigate wireless technology and the implications related to the privacy of the average user.