{"title":"A Comparative Study of Analysis and Investigation using Digital Forensics","authors":"Nikunj Pansari, A. Agarwal","doi":"10.30726/ijlca/v7.i2.2020.72004","DOIUrl":"https://doi.org/10.30726/ijlca/v7.i2.2020.72004","url":null,"abstract":"Data Analysis and Investigation using Digital forensics from Digital Storage Devices, is a defined way towards effective data backup strategies, as well as a key aspect in Data Privacy and Confidentiality. Digital storage Devices like Hard Drives (internal or external), USB Drives, floppy disks, etc. provide a good medium for better utilisation and storage of data and information. So, the main task is to retrieve the stolen or lost data from these devices. Digital forensics provides the exact concept for this data extraction, in a systematic and effective manner. Now, there can be various conditions of a damaged digital storage device like it may be burnt, wet or physically damaged parts, all these conditions play a significant role in Data Extraction. Since, Data is the most important asset for any organisation, so compromising with its Security and Confidentiality, may be wrong or devastating option, for future. Just spending thousands and millions of dollars in finding the vulnerability (large-scale or small-scale), is not a solution for being secure. There has to be proper and effective choice of ways and tools for it.","PeriodicalId":292423,"journal":{"name":"CompSciRN: Digital Forensics (Topic)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132294064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ananyev, Dimitrios Xefteris, Galina Zudenkova, M. Petrova
{"title":"Information and Communication Technologies, Protests, and Censorship","authors":"M. Ananyev, Dimitrios Xefteris, Galina Zudenkova, M. Petrova","doi":"10.2139/ssrn.2978549","DOIUrl":"https://doi.org/10.2139/ssrn.2978549","url":null,"abstract":"We develop a theory of information flows and political regime change, when citizens use information and communication technologies (ICTs) for both information acquisition and protest coordination. Governments can respond by obfuscation of citizens' signal or by restricting access to ICTs used for coordination. We find that introduction of communication technologies lowers the probability of regime survival, but this effect is weaker in economies that do not use ICTs for production. We also expect less competent governments to use coordination censorship, though this effect is weaker in economies that use ICTs extensively. Some high-frequency empirical evidence is consistent with our predictions.","PeriodicalId":292423,"journal":{"name":"CompSciRN: Digital Forensics (Topic)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129770185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of DDoS Attack in SDN Network","authors":"A. Dumka, P. Bansal","doi":"10.2139/ssrn.3384009","DOIUrl":"https://doi.org/10.2139/ssrn.3384009","url":null,"abstract":"Software Defined network is one of the emerging technology which enhances the working of network by merging the concept of networking with software, where network is manageable by means of software. This technology changes the way of working of networking at a glance. Security is one of the issue with any networking technology as a single intrusion may cost the entire network. Distributed denial-of-service is one of the security issue which attack the system and hampered the normal working of the system. This paper discusses about security within software defined network taking the case of denial of service attack and discuss how Denial of service attack affects the performance of the software defined network taking parameter of entropy for measuring the performance of software defined network.","PeriodicalId":292423,"journal":{"name":"CompSciRN: Digital Forensics (Topic)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124677893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}