Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 91 - 96 of 96

Full-Text Articles in Physical Sciences and Mathematics

Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore May 2014

Life (Logical Iosforensics Examiner): An Open Source Iosbackup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper, we present LiFE (Logical iOS Forensics Examiner), an open source iOS backup forensics examination tool. This tool helps both researchers and practitioners alike in both understanding the backup structures of iOS devices and forensically examining iOS backups. The tool is currently capable of parsing device information, call history, voice messages, GPS locations, conversations, notes, images, address books, calendar entries, SMS messages, Aux locations, facebook data and e-mails. The tool consists of both a manual interface (where the user is able to manually examine the backup structures) and an automated examination interface (where the tool pulls out evidence …


Why Penetration Testing Is A Limited Use Choice For Sound Cyber Security Practice, Craig Valli, Andrew Woodward, Peter Hannay, Mike Johnstone May 2014

Why Penetration Testing Is A Limited Use Choice For Sound Cyber Security Practice, Craig Valli, Andrew Woodward, Peter Hannay, Mike Johnstone

Annual ADFSL Conference on Digital Forensics, Security and Law

Penetration testing of networks is a process that is overused when demonstrating or evaluating the cyber security posture of an organisation. Most penetration testing is not aligned with the actual intent of the testing, but rather is driven by a management directive of wanting to be seen to be addressing the issue of cyber security. The use of penetration testing is commonly a reaction to an adverse audit outcome or as a result of being penetrated in the first place. Penetration testing used in this fashion delivers little or no value to the organisation being tested for a number of …


Awareness Of Scam E-Mails: An Exploratory Research Study, Tejashree D. Datar, Kelly A. Cole, Marcus K. Rogers May 2014

Awareness Of Scam E-Mails: An Exploratory Research Study, Tejashree D. Datar, Kelly A. Cole, Marcus K. Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

The goal of this research was to find the factors that influence a user’s ability to identify e-mail scams. It also aimed to understand user’s awareness regarding e-mail scams and actions that need to be taken if and when victimized. This study was conducted on a university campus with 163 participants. This study presented the participants with two scam e-mails and two legitimate e-mails and asked the participants to correctly identify these e-mails as scam or legitimate. The study focused on the ability of people to differentiate between scam and legitimate e-mails. The study attempted to determine factors that influence …


Relating Air Quality In The Work Environment To Occupational Health Disease, Hussien Awad Alumar May 2013

Relating Air Quality In The Work Environment To Occupational Health Disease, Hussien Awad Alumar

Doctoral Dissertations and Master's Theses

Comprehensive knowledge of the air pollutants effects on the human health generally is a crucial requirement in developing effective policies for reducing such adverse effects related to ambient air pollution. Such knowledge would be essential in helping various affected countries, including the less developed countries (LDCs), to develop effective regulatory frameworks for assessing and managing air quality in the workplaces. Developed and developing countries therefore need to develop effective techniques or strategies focused towards improving the workplace monitoring competence in diverse industrial environments. Such initiatives are essential in reducing or eliminating the industrial pollutants within the workplaces while also helping …


The Influence Of Automation On Aviation Accident And Fatality Rates: 2000-2010, Nicholas A. Koeppen Jul 2012

The Influence Of Automation On Aviation Accident And Fatality Rates: 2000-2010, Nicholas A. Koeppen

Publications

The purpose of this project is to evaluate if technological advances and implementation of automation have produced a decrease in the number and severity of accidents in commercial aviation over the last decade. To accomplish this evaluation historical commercial aviation accident data from 2000 to 2010 will be examined. Commercial fixed wing and rotary wing data will be evaluated. No aviation incident data will be collected; the project will be limited in scope to commercial aviation accidents. Accidents highlighting major deficiencies involving automation will be discussed in detail. To further support the projects purpose, emphasis will be given to evaluate …


Integration Of The Shel Model With The Flight Operational Quality Assurance (Foqa) Program, James T. Schultz, Scott Forn, Marian C. Schultz Oct 2005

Integration Of The Shel Model With The Flight Operational Quality Assurance (Foqa) Program, James T. Schultz, Scott Forn, Marian C. Schultz

Publications

The SHEL Model has been used to explore relationships between liveware, environmental, hardware and software factors. This study attempts to integrate Flight Operational Quality Assurance (FOQA) program data with the SHEL model. Aircraft record data that can be used to monitor the human interface within the entire system, plus identify faults and potential failures within the system before a major accident or incident occurs. These data have existed for over four decades, and FOQA offers a way to both analyze and act upon them. The relationships between the SHEL model and FOQA data can help to ensure our nation's skies …