Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (28)
- Sociology (24)
- Physical Sciences and Mathematics (21)
- Public Affairs, Public Policy and Public Administration (19)
- National Security Law (18)
-
- Aviation (17)
- Aviation Safety and Security (17)
- Computer Law (17)
- Computer Sciences (17)
- Defense and Security Studies (17)
- Engineering (17)
- Forensic Science and Technology (17)
- Information Security (17)
- Legal Studies (17)
- OS and Networks (17)
- Other Computer Sciences (17)
- Social Control, Law, Crime, and Deviance (17)
- Law and Gender (8)
- Domestic and Intimate Partner Violence (7)
- Education (6)
- Business (5)
- Air and Space Law (4)
- International and Comparative Education (4)
- Legal Education (4)
- Arts and Humanities (3)
- Civil Rights and Discrimination (3)
- Environmental Law (3)
- Environmental Sciences (3)
- Legal Writing and Research (3)
- Institution
-
- Embry-Riddle Aeronautical University (21)
- University of Kentucky (7)
- American University Washington College of Law (4)
- University for Business and Technology in Kosovo (4)
- University of Georgia School of Law (4)
-
- University of Nevada, Las Vegas -- William S. Boyd School of Law (3)
- William & Mary Law School (3)
- Cedarville University (2)
- Golden Gate University School of Law (2)
- Florida International University (1)
- Georgia State University (1)
- Institute of Business Administration (1)
- Nova Southeastern University (1)
- Purdue University (1)
- Stephen F. Austin State University (1)
- University of Nevada, Las Vegas (1)
- University of Richmond (1)
- University of Tennessee, Knoxville (1)
- Western Washington University (1)
- Keyword
-
- Integration (2)
- Australia (1)
- Caregivers (1)
- Chronic and communicable disease (1)
- Conditionality (1)
-
- Consent (Law) (1)
- Contemporary legal and ethical issues (1)
- Criminal Procedure Code (1)
- Decision making (1)
- EU Candidate Country status (1)
- Ethics (1)
- European Union treaty law (1)
- Europeanization (1)
- Foreign legal assistance (1)
- Fractional reserve banking (1)
- Harmonization (1)
- Health education (1)
- Informed consent (Medical law) (1)
- Institutions (1)
- Judiciary (1)
- Kosovo Legal System (1)
- Legal Transplants (1)
- Life and death (1)
- Northern Ireland (1)
- Pakistan (1)
- People with mental disabilities (1)
- People with mental disabilities--Means of communication (1)
- People with mental disabilities—Care (1)
- People with mental disabilities—Education (1)
- Pharmaceutical industry (1)
- Publication
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (17)
- NSF-NIJ IPV Prevention Workshop (7)
- Continuing Legal Education Presentations (4)
- International Legal Education Abroad Conference (4)
- Space Traffic Management Conference (4)
-
- UBT International Conference (4)
- ELPR Annual Symposium (2)
- Public Interest Law Film Festival (2)
- The Research and Scholarship Symposium (2013-2019) (2)
- Created Equal: America’s Civil Rights Struggle (1)
- EURēCA: Exhibition of Undergraduate Research and Creative Achievement (1)
- Fulbright Symposium (1)
- Georgia State Undergraduate Research Conference (1)
- Graduate Research Symposium (GCUA) (2010 - 2017) (1)
- International Conference on Marketing (1)
- Purdue Road School (1)
- Salish Sea Ecosystem Conference (1)
- South Florida Education Research Conference (1)
- The Jesse Carter Distinguished Lecture Series (1)
- Undergraduate Research Conference (1)
- Undergraduate Student Symposium (1)
- University of Richmond Law Review Symposium (1)
- Virginia Coastal Policy Center Annual Conference (1)
Articles 1 - 30 of 60
Full-Text Articles in Law
Commission Meeting: Report On Climate Change Progress In Virginia, James Redick, Carlton H. Hershner, Paul Olsen, Bill Shelton
Commission Meeting: Report On Climate Change Progress In Virginia, James Redick, Carlton H. Hershner, Paul Olsen, Bill Shelton
Virginia Coastal Policy Center Annual Conference
Q&A from the Commission members.
Forgotten Women: Incarceration And Health Concerns Of Minority Women, Chaundra L. Whitehead, Regina Mcdade, Mary Mites-Campbell
Forgotten Women: Incarceration And Health Concerns Of Minority Women, Chaundra L. Whitehead, Regina Mcdade, Mary Mites-Campbell
South Florida Education Research Conference
Paper Presentation
Exploring The “Faces” Of Europeanization From An Albanian Perspective, Irma Spahiu
Exploring The “Faces” Of Europeanization From An Albanian Perspective, Irma Spahiu
UBT International Conference
Europeanization is a process existent in all countries applying for EU membership, including Albania. This article aims to explore Olsen’s faces of Europeanization by looking at how this process has taken place in Albania and if it has led to substantial changes in the Albanian politics and governance. It has been argued that Europeanization is a dual process that affects both domestic policies and European Union. The article explores this relationship in the Albanian case. It argues that Europeanization in Albania is occurring in an “Albanian fashion-way” with some unique features which are labelled as ‘Europeanization by convenience’.
The Importance Of The Judiciary For The European Integration Of Eu Candidate Countries: The Case Of Albania, Klodian Rado
The Importance Of The Judiciary For The European Integration Of Eu Candidate Countries: The Case Of Albania, Klodian Rado
UBT International Conference
All Western Balkan countries currently holding the EU Candidate Country status, namely, Albania, Montenegro, FYROM, Serbia, and hopefully in the near future Kosovo, are in a critical stage of the EU integration. From their institutions are required serious reforms which are necessary for almost all the of above countries. The focus of this paper is Albania. After the approval of the EU Candidate Country status, each branch of the Albanian government is now facing new legal challenges. However, at this stage, the central role passes to the judiciary, which should and could turn into a real “engine” of the EU …
Principles Of Modern Contract Law, Berat Aqifi, Sasha Dukoski
Principles Of Modern Contract Law, Berat Aqifi, Sasha Dukoski
UBT International Conference
Harmonization of law is inevitably linked with overall procedure for adjusting the national legislation by establishing a framework of acceptable principles and common rules in the field of Contract Law in the European Union. With the adoption of uniform rules to be applied in the field of regulation of contracts at the same time removing barriers that arise as a hindrance to smooth flow of transactions , which enriches the legal doctrine . The paper specifically highlights the role of Landon's principles , which are one of the most significant acts of unification adopted in the area of harmonization of …
Legal Transplants And Their Impact On Kosovo's Legal System, Vlora Marmullakaj
Legal Transplants And Their Impact On Kosovo's Legal System, Vlora Marmullakaj
UBT International Conference
Alan Watson once argued that a rule which is transplanted is different in its new home. For a poor village housewife 'bread' does not have the same meaning as for the wealthy Parisian businessman. The housewife has much less choice, is close to the source of supply, and bread plays a very different role in the family diet. Similarly, foreign legal rules transplanted to the legal system of Kosovo may have different results than in their legal system of origin. Kosovo is a country with a unique history of state-building. As a new state, Kosovo had to be built from …
U.S. Private On-Orbit Space Situational Awareness Systems And Services: Legal And Regulatory Challenges, Michael Mineiro
U.S. Private On-Orbit Space Situational Awareness Systems And Services: Legal And Regulatory Challenges, Michael Mineiro
Space Traffic Management Conference
One component of Space Traffic Management (STM) is on-orbit Space Situational Awareness (SSA) systems and services. Advances in technology and a growing demand for SSA services, information, and data, coupled with U.S. Government policy that promotes the purchase and use of commercial SSA capabilities, means that private commercial sector is likely to have an important role to play. To date, there is no federal agency with clear jurisdiction over on-orbit remote sensing operations. This paper examines the current regulatory framework, identifies gaps and limitations, and identifies possible ways forward.
Small Satellites And Liability Associated With Space Traffic Situational Awareness, George Anthony Long
Small Satellites And Liability Associated With Space Traffic Situational Awareness, George Anthony Long
Space Traffic Management Conference
At the commencement of the space age, satellites were very small objects that subsequently grew in size and complexity. A re-emergence of small satellites is occurring given that technology now allows them to perform certain operations of large satellites. This paper will explore the risk and liability in space traffic situational awareness associated with the proliferation in the deployment of small satellites.
Small satellites encompass a range of space objects referred to as nanosatellites, microsatellites, picosatellites, cube satellites, femtosatellites and other designations. These satellites are generally placed into orbit as part of a “piggyback” payload on other launches or cargo …
Toward The International Regime For Space Traffic Management -What To Fix The Current International Regulations-, Yu Takeuchi
Toward The International Regime For Space Traffic Management -What To Fix The Current International Regulations-, Yu Takeuchi
Space Traffic Management Conference
Space Traffic Management (STM) is an effective concept for providing a solution to the current congested, contested, and competed situation of outer space. However the status of international legal system governing outer space remains at its original formation of the 1960s. Filling this gap is an inescapable task soon or late and it is necessary to establish the international regime for STM to do so. Various issues of the UN Space Treaties and relevant soft laws have been discussed in the context of STM item-by-item, but few are oriented to the establishment of a comprehensive international regime for STM.
This …
How To Reach An International Civil Aviation Organization Role In Space Traffic Management, Lt. Col. Stephen Hunter
How To Reach An International Civil Aviation Organization Role In Space Traffic Management, Lt. Col. Stephen Hunter
Space Traffic Management Conference
The late President Emeritus of the ICAO Council, Assad Kotaite, recommended a new annex to the Chicago Convention to extend ICAO responsibilities for producing International Standards and Recommended Practices (SARPs) for suborbital and orbital civil space flights[i]. Additionally, the U.S. Office of the Secretary of Defense and the European Union have independently conceived standards that have yet to mature to an amicable stage. This impetus to develop SARPs is growing more urgent as space becomes more congested, contested and competitive. In order to best determine how to mature internationally acceptable SARPs for seamless operations from tropospheric to exo-atmospheric …
Lethal Injection, Politics, And The Future Of The Death Penalty, Stephen Bright, Deborah W. Denno, Joel Zivot, Eric Berger, Frank Green, Mark Earley, Richard B. Roper, Corinna Barrett Lain, Stephen Smith, John Douglass, Brandon L. Garrett, Richard Dieter
Lethal Injection, Politics, And The Future Of The Death Penalty, Stephen Bright, Deborah W. Denno, Joel Zivot, Eric Berger, Frank Green, Mark Earley, Richard B. Roper, Corinna Barrett Lain, Stephen Smith, John Douglass, Brandon L. Garrett, Richard Dieter
University of Richmond Law Review Symposium
“Welcome and Keynote:” Stephen Bright, Harvey Karp Visiting Lecturer at Yale Law School, and President and Senior Counsel with the Southern Center for Human Rights. (9:00 a.m. - 9:45 a.m.)
“The Death Penalty Today: Lethal Injection Issues:” Panel 1 featured Deborah W. Denno, Arthur A. McGivney Professor of Law at Fordham University School of Law; Joel Zivot, Assistant Professor of Anesthesiology and Surgery at Emory University School of Medicine, and Medical Director of the Cardiothoracic Intensive Care Unit at Emory University Hospital; Eric Berger, Associate Professor of Law at Nebraska College of Law; and Frank Green, Reporter for the Richmond …
Film Festival Flyer, University Of Nevada, Las Vegas -- William S. Boyd School Of Law
Film Festival Flyer, University Of Nevada, Las Vegas -- William S. Boyd School Of Law
Public Interest Law Film Festival
No abstract provided.
Law Library Documentary Film Collection Brochure, University Of Nevada, Las Vegas -- William S. Boyd School Of Law
Law Library Documentary Film Collection Brochure, University Of Nevada, Las Vegas -- William S. Boyd School Of Law
Public Interest Law Film Festival
No abstract provided.
Gay Marriage And State Constitutional Provisions, Nicholas Goddard
Gay Marriage And State Constitutional Provisions, Nicholas Goddard
Undergraduate Research Conference
No abstract provided.
Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague
Hot Zone Identification: Analyzing Effects Of Data Sampling On Spam Clustering, Rasib Khan, Mainul Mizan, Ragib Hasan, Alan Sprague
Annual ADFSL Conference on Digital Forensics, Security and Law
Email is the most common and comparatively the most efficient means of exchanging information in today's world. However, given the widespread use of emails in all sectors, they have been the target of spammers since the beginning. Filtering spam emails has now led to critical actions such as forensic activities based on mining spam email. The data mine for spam emails at the University of Alabama at Birmingham is considered to be one of the most prominent resources for mining and identifying spam sources. It is a widely researched repository used by researchers from different global organizations. The usual process …
Investigative Techniques Of N-Way Vendor Agreement And Network Analysis Demonstrated With Fake Antivirus, Gary Warner, Mike Nagy, Kyle Jones, Kevin Mitchem
Investigative Techniques Of N-Way Vendor Agreement And Network Analysis Demonstrated With Fake Antivirus, Gary Warner, Mike Nagy, Kyle Jones, Kevin Mitchem
Annual ADFSL Conference on Digital Forensics, Security and Law
Fake AntiVirus (FakeAV) malware experienced a resurgence in the fall of 2013 after falling out of favor after several high profile arrests. FakeAV presents two unique challenges to investigators. First, because each criminal organization running a FakeAV affiliate system regularly alters the appearance of their system, it is sometimes difficult to know whether an incoming criminal complaint or malware sample is related to one ring or the other. Secondly, because FakeAV is delivered in a “Pay Per Install” affiliate model, in addition to the ring-leaders of each major ring, there are many high-volume malware infection rings who are all using …
Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen
Work In Progress: An Architecture For Network Path Reconstruction Via Backtraced Ospf Lsdb Synchronization, Raymond A. Hansen
Annual ADFSL Conference on Digital Forensics, Security and Law
There has been extensive work in crime scene reconstruction of physical locations, and much is known in terms of digital forensics of computing devices. However, the network has remained a nebulous combination of entities that are largely ignored during an investigation due to the transient nature of the data that flows through the networks. This paper introduces an architecture for network path reconstruction using the network layer reachability information shared via OSPF Link State Advertisements and the routines and functions of OSPF::rt_sched() as applied to the construction of identical Link State Databases for all routers within an Area.
Application Of Toral Automorphisms To Preserve Confidentiality Principle In Video Live Streaming, Enrique García-Carbajal, Clara Cruz-Ramos, Mariko Nakano-Miyatake
Application Of Toral Automorphisms To Preserve Confidentiality Principle In Video Live Streaming, Enrique García-Carbajal, Clara Cruz-Ramos, Mariko Nakano-Miyatake
Annual ADFSL Conference on Digital Forensics, Security and Law
Most of the Live Video Systems do not preserve the Confidentiality principle, and send all frames of the video without any protection, allowing an easy “man in the middle” attack. But when it does, it uses cryptographic techniques over streaming data or makes use of secure channel systems. This generates low frame rate and demands many processor resources. In fact native Live Video Streaming demands many resources of all System.
In this paper we propose a technique to preserve confidentiality in Video Live Streaming applying a confusing visual method making use of the Toral Automorphism Spatial Transformation over each frame. …
Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt
Visualizing Instant Messaging Author Writeprints For Forensic Analysis, Angela Orebaugh, Jason Kinser, Jeremy Allnutt
Annual ADFSL Conference on Digital Forensics, Security and Law
As cybercrime continues to increase, new cyber forensics techniques are needed to combat the constant challenge of Internet anonymity. In instant messaging (IM) communications, criminals use virtual identities to hide their true identity, which hinders social accountability and facilitates cybercrime. Current instant messaging products are not addressing the anonymity and ease of impersonation over instant messaging. It is necessary to have IM cyber forensics techniques to assist in identifying cyber criminals as part of the criminal investigation. Instant messaging behavioral biometrics include online writing habits, which may be used to create an author writeprint to assist in identifying an author …
Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack
Botnet Forensic Investigation Techniques And Cost Evaluation, Brian Cusack
Annual ADFSL Conference on Digital Forensics, Security and Law
Botnets are responsible for a large percentage of damages and criminal activity on the Internet. They have shifted attacks from push activities to pull techniques for the distribution of malwares and continue to provide economic advantages to the exploiters at the expense of other legitimate Internet service users. In our research we asked; what is the cost of the procedural steps for forensically investigating a Botnet attack? The research method applies investigation guidelines provided by other researchers and evaluates these guidelines in terms of the cost to a digital forensic investigator. We conclude that investigation of Botnet attacks is both …
Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang
Development And Dissemination Of A New Multidisciplinary Undergraduate Curriculum In Digital Forensics, Masooda Bashir, Jenny A. Applequist, Roy H. Campbell, Lizanne Destefano, Gabriela L. Garcia, Anthony Lang
Annual ADFSL Conference on Digital Forensics, Security and Law
The Information Trust Institute (ITI) at the University of Illinois at Urbana-Champaign is developing an entirely new multidisciplinary undergraduate curriculum on the topic of digital forensics, and this paper presents the findings of the development process, including initial results and evaluation of a pilot offering of the coursework to students. The curriculum consists of a four-course sequence, including introductory and advanced lecture courses with parallel laboratory courses, followed by an advanced course. The content has been designed to reflect both the emerging national standards and the strong multidisciplinary character of the profession of digital forensics, and includes modules developed collaboratively …
Computer Forensics For Accountants, Grover S. Kearns
Computer Forensics For Accountants, Grover S. Kearns
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital attacks on organizations are becoming more common and more sophisticated. Firms are interested in providing data security and having an effective means to respond to attacks. Accountants possess important investigative and analytical skills that serve to uncover fraud in forensic investigations. Some accounting students take courses in forensic accounting but few colleges offer a course in computer forensics for accountants. Educators wishing to develop such a course may find developing the curriculum daunting. A major element of such a course is the use of forensic software. This paper argues the importance of computer forensics to accounting students and offers …
Applying Memory Forensics To Rootkit Detection, Igor Korkin, Ivan Nesterov
Applying Memory Forensics To Rootkit Detection, Igor Korkin, Ivan Nesterov
Annual ADFSL Conference on Digital Forensics, Security and Law
Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of various software and hardware approaches for memory dumping there are authors who point out that some of these approaches are not resilient to various anti-forensic techniques, and others that require a reboot or are highly platform dependent. New resilient tools have certain disadvantages such as low speed or vulnerability to rootkits which directly manipulate kernel structures, e.g., page tables. A new memory forensic system – Malware Analysis System for Hidden Knotty Anomalies (MASHKA) is described in this paper. It is resilient to popular …
The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision, John W. Bagby, Byron Granda, Emily Benoit, Alexander Logan, Ryan Snell, Joseph J. Schwerha
The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision, John W. Bagby, Byron Granda, Emily Benoit, Alexander Logan, Ryan Snell, Joseph J. Schwerha
Annual ADFSL Conference on Digital Forensics, Security and Law
Pre-trial discovery is perpetually controversial. Parties advantaged by strict privacy can often avoid justice when this is disadvantageous to their interests. Contrawise, parties advantaged by relaxed litigation privacy can achieve justice when all facts are accessible irrespective of their repositories, ownership or control. American-style pre-trial discovery in civil and regulatory enforcement is relatively rare around the world. U.S. discovery rules open nearly all relevant and non-privileged data for use by opposing parties. The traditional discovery process was costly and time consuming in the world of tangible paper data. However, these burdens have increased, rather than diminished as often predicted, as …
Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter
Testing And Evaluating The Harmonised Digital Forensic Investigation Process In Post Mortem Digital Investigation, Emilio R. Mumba, H. S. Venter
Annual ADFSL Conference on Digital Forensics, Security and Law
Existing digital forensic investigation process models have provided guidelines for identifying and preserving potential digital evidence captured from a crime scene. However, for any of the digital forensic investigation process models developed across the world to be adopted and fully applied by the scientific community, it has to be tested. For this reason, the Harmonized Digital Forensic Investigation Process (HDFIP) model, currently a working draft towards becoming an international standard for digital forensic investigations (ISO/IEC 27043), needs to be tested.
This paper, therefore, presents the findings of a case study used to test the HDFIP model implemented in the ISO/IEC …
Generation And Handling Of Hard Drive Duplicates As Piece Of Evidence, T. Kemmerich, F. Junge, N. Kuntze, C. Rudolph, B. Endicott-Popovsky, L. Großkopf
Generation And Handling Of Hard Drive Duplicates As Piece Of Evidence, T. Kemmerich, F. Junge, N. Kuntze, C. Rudolph, B. Endicott-Popovsky, L. Großkopf
Annual ADFSL Conference on Digital Forensics, Security and Law
An important area in digital forensics is images of hard disks. The correct production of the images as well as the integrity and authenticity of each hard disk image is essential for the probative force of the image to be used at court. Integrity and authenticity are under suspicion as digital evidence is stored and used by software based systems. Modifications to digital objects are hard or even impossible to track and can occur even accidentally. Even worse, vulnerabilities occur for all current computing systems. Therefore, it is difficult to guarantee a secure environment for forensic investigations. But intended deletions …
Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson
Internet Addiction To Child Pornography, Rachel Sitarz, Marcus Rogers, Lonnie Bentley, Eugene Jackson
Annual ADFSL Conference on Digital Forensics, Security and Law
During the present age and time, it seems as though people in society have become addicted to nearly anything and everything, whether it be to a substance, an activity or an object. The Internet and pornography is no exception. While commonly thought of as a deviant behavior, many are displaying addictions towards the Internet and pornography. More alarming, however, are those who are viewing, downloading, or trading child pornography and displaying addictive Internet behaviors, for they are spending excessive amounts of time engaging in the proliferation of child pornographic materials. For this reason, addiction to the Internet and usage of …
Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar
Using Internet Artifacts To Profile A Child Pornography Suspect, Marcus K. Rogers, Kathryn C. Seigfried-Spellar
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; …
Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore
Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper, we present LiFE (Logical iOS Forensics Examiner), an open source iOS backup forensics examination tool. This tool helps both researchers and practitioners alike in both understanding the backup structures of iOS devices and forensically examining iOS backups. The tool is currently capable of parsing device information, call history, voice messages, GPS locations, conversations, notes, images, address books, calendar entries, SMS messages, Aux locations, facebook data and e-mails. The tool consists of both a manual interface (where the user is able to manually examine the backup structures) and an automated examination interface (where the tool pulls out evidence …
Why Penetration Testing Is A Limited Use Choice For Sound Cyber Security Practice, Craig Valli, Andrew Woodward, Peter Hannay, Mike Johnstone
Why Penetration Testing Is A Limited Use Choice For Sound Cyber Security Practice, Craig Valli, Andrew Woodward, Peter Hannay, Mike Johnstone
Annual ADFSL Conference on Digital Forensics, Security and Law
Penetration testing of networks is a process that is overused when demonstrating or evaluating the cyber security posture of an organisation. Most penetration testing is not aligned with the actual intent of the testing, but rather is driven by a management directive of wanting to be seen to be addressing the issue of cyber security. The use of penetration testing is commonly a reaction to an adverse audit outcome or as a result of being penetrated in the first place. Penetration testing used in this fashion delivers little or no value to the organisation being tested for a number of …