Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Edith Cowan University

Australian Digital Forensics Conference

2013

Digital forensics

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

An Investigation Into The Efficiency Of Forensic Data Erasure Tools For Removable Usb Flash Memory Storage Devices, Krishnun Sansurooah, Haydon Hope, Hani Almutairi, Fayadh Alnazawi, Yunhan Jiang Dec 2013

An Investigation Into The Efficiency Of Forensic Data Erasure Tools For Removable Usb Flash Memory Storage Devices, Krishnun Sansurooah, Haydon Hope, Hani Almutairi, Fayadh Alnazawi, Yunhan Jiang

Australian Digital Forensics Conference

Securely erasing data is of key importance to anyone that is concerned with the security of their sensitive information, whether an individual or an organization. Simply deleting the data in question or formatting the storage device is not enough to ensure that the data cannot be recovered. Furthermore, with the uptake of Universal Serial Bus drives (USBs) flash memory based storage devices have replaced previous portable secondary storage media. Therefore, it is of a major concern whether these tools and products developed for securely erasing data secondary storage Hard Disk Drives (HDDs) would be as efficient when targeting the USB …


Security Analysis And Forensic Investigation Of Home & Commercial Alarm Systemsin New Zealand: Current Research Findings, Alastair Nisbet, Maria Kim Dec 2013

Security Analysis And Forensic Investigation Of Home & Commercial Alarm Systemsin New Zealand: Current Research Findings, Alastair Nisbet, Maria Kim

Australian Digital Forensics Conference

Alarm systems with keypads, sensors and sirens protect our homes and commercial premises from intruders. The reliability of these systems has improved over the past years but the technology has remained largely as it was 3 decades ago. With simple keypads and generally 4 digit PIN codes used for setting and unsetting the alarms, the main protection against a determined intruder is the necessity to choose robust PIN codes. However, with PIN codes chosen that are generally easy to remember and therefore relatively easy to guess, or numbers chosen to follow a pattern on the keypad, the main protection from …


Sellers Continue To Give Away Confidential Information On Second Hand Memory Cards Sold In Australia, Patryk Szewczyk, Nikki Robins, Krishnun Sansurooah Jan 2013

Sellers Continue To Give Away Confidential Information On Second Hand Memory Cards Sold In Australia, Patryk Szewczyk, Nikki Robins, Krishnun Sansurooah

Australian Digital Forensics Conference

Second hand storage devices can be treasure troves of confidential data. This study investigated the remnant data on second hand memory cards that were purchased through Australian second hand auction websites throughout 2013. Memory cards continue to increase in capacity and are used in both smart phones and tablet computers as persistent storage. During this study a total of 140 second hand memory cards were purchased throughout 2013. Each memory card had its data recovered and subsequently analysed. The results show that sellers are sending memory cards with no evidence of erasure; poor attempts to erase data; or simply asking …