J. Digit. Forensics Secur. Law最新文献

筛选
英文 中文
Science Column: Reconstruction: The Experimental Side of Digital Forensics 科学专栏:重建:数字取证的实验方面
J. Digit. Forensics Secur. Law Pub Date : 2013-12-31 DOI: 10.15394/JDFSL.2013.1155
F. Cohen
{"title":"Science Column: Reconstruction: The Experimental Side of Digital Forensics","authors":"F. Cohen","doi":"10.15394/JDFSL.2013.1155","DOIUrl":"https://doi.org/10.15394/JDFSL.2013.1155","url":null,"abstract":"Many in digital forensics seem to forget that the science part of digital forensics means experimentation and that implies a whole lot of things that most practitioners never learned. (see PDF for full column)","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"3 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113963272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Second Hand Google Mini Search Appliance 二手Google迷你搜索设备分析
J. Digit. Forensics Secur. Law Pub Date : 2013-12-31 DOI: 10.15394/jdfsl.2013.1153
S. Larson
{"title":"Analysis of Second Hand Google Mini Search Appliance","authors":"S. Larson","doi":"10.15394/jdfsl.2013.1153","DOIUrl":"https://doi.org/10.15394/jdfsl.2013.1153","url":null,"abstract":"Information and the technological advancements for which mankind develops with regards to its storage has increased tremendously over the past few decades. As the total amount of data stored rapidly increases in conjunction with the amount of widely available computer-driven devices being used, solutions are being developed to better harness this data (LaTulippe, 2011).  One of these solutions is commonly known as a search appliance. Search appliances have been used in e-discovery for several years. The Google Mini Search Appliance (Mini) has not only been used for e-discovery, but for indexing and searching internal documents. To accomplish these tasks, search appliances not only cache html versions of the documents, they contain metadata about the indexed documents, as well as metadata about search activity. This research analyzes the Mini to determine what forensically interesting artifacts exist on the device.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133195103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trends In Android Malware Detection Android恶意软件检测的趋势
J. Digit. Forensics Secur. Law Pub Date : 2013-09-30 DOI: 10.15394/jdfsl.2013.1149
Kaveh Shaerpour, A. Dehghantanha, R. Mahmod
{"title":"Trends In Android Malware Detection","authors":"Kaveh Shaerpour, A. Dehghantanha, R. Mahmod","doi":"10.15394/jdfsl.2013.1149","DOIUrl":"https://doi.org/10.15394/jdfsl.2013.1149","url":null,"abstract":"This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewed extensively and the core features of each technique are highlighted and contrasted with the others. The challenges faced during the development of such techniques are also discussed along with the future prospects for Android malware detection. The findings of the review have been well documented in this paper to aid those making an effort to research in the area of Android malware detection by understanding the current scenario and developments that have happened in the field thus far.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114946673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Book Review: Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E 书评:《专业渗透测试:在黑客实验室中创建和学习》
J. Digit. Forensics Secur. Law Pub Date : 2013-09-30 DOI: 10.15394/jdfsl.2013.1152
Joshua Bartolomie
{"title":"Book Review: Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E","authors":"Joshua Bartolomie","doi":"10.15394/jdfsl.2013.1152","DOIUrl":"https://doi.org/10.15394/jdfsl.2013.1152","url":null,"abstract":"Wilhelm, T. (2013). Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E. Waltham, MA: Syngress, 464 pages, ISBN-10: 1597499935; ISBN-13: 978-1597499934, US$79.99 Reviewed by Joshua Bartolomie, CISSP, CEECS, CFCE, DFCP, CRISC, CSM Organizations often strive for proactive information security programs in an effort to limit occurrence and impact of security breaches. However, traditional security programs run the risk of being unable to provide adequate insight and proactive awareness into real attack vectors that may exist within their organizations. With attack methods and efforts becoming increasingly aggressive, and effective, organizations must take equally assertive measures to protect their critical information and assets. Penetration testing is one of those tools that is often misunderstood, overlooked, and undervalued. A true adversary would not hesitate to exploit every potential to gain entry or cause a disruption to their target. (see PDF for full review)","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123226071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk Management Of Email And Internet Use In The Workplace 工作场所使用电子邮件和互联网的风险管理
J. Digit. Forensics Secur. Law Pub Date : 2013-09-30 DOI: 10.15394/jdfsl.2013.1148
J. C. Ruhnka, Windham E. Loopesko
{"title":"Risk Management Of Email And Internet Use In The Workplace","authors":"J. C. Ruhnka, Windham E. Loopesko","doi":"10.15394/jdfsl.2013.1148","DOIUrl":"https://doi.org/10.15394/jdfsl.2013.1148","url":null,"abstract":"The article surveys the changing risk environment for corporations from their employees electronic communications. It identifies the types of liabilities thatcorporations can incur from such communications. It presents the objectives of corporate internet use policies and the types of provisions such policies should contain. It suggests an alternative risk-based approach to corporate acceptable use policies instead of atraditional “laundry list” of internet use prohibitions.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126091608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Digital Forensics and Security Challenge of QR Codes 二维码的数字取证和安全挑战
J. Digit. Forensics Secur. Law Pub Date : 2013-06-30 DOI: 10.15394/jdfsl.2013.1143
Nik Thompson, Kevin Lee
{"title":"The Digital Forensics and Security Challenge of QR Codes","authors":"Nik Thompson, Kevin Lee","doi":"10.15394/jdfsl.2013.1143","DOIUrl":"https://doi.org/10.15394/jdfsl.2013.1143","url":null,"abstract":"The disciplines of digital forensics and IT security must adapt to new technologies and methods of interaction with those technologies.  New technologies present both challenges and opportunities for providing evidence for digital forensics investigations.  These may be in the form of new devices such as smartphones or new methods of sharing information, such as social networks.  One such rapidly emerging interaction technology is the use of Quick Response (QR) codes.  These offer a physical mechanism for quick access to web sites for advertising and social interaction.  This paper argues that the common implementation of QR codes potentially presents security issues which must be considered.  It analyzes potential privacy problems with QR codes and studies a range of devices as they may have implications for the process of evidence collection and analysis.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130245679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects 书评:将嫌疑人置于键盘后面:使用数字取证和调查技术来识别网络犯罪嫌疑人
J. Digit. Forensics Secur. Law Pub Date : 2013-06-30 DOI: 10.15394/jdfsl.2013.1146
T. Nash
{"title":"Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects","authors":"T. Nash","doi":"10.15394/jdfsl.2013.1146","DOIUrl":"https://doi.org/10.15394/jdfsl.2013.1146","url":null,"abstract":"Shavers, B. (2013). Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects. Waltham, MA: Elsevier, 290 pages, ISBN-978-1-59749-985-9, US$51.56. Includes bibliographical references and index. Reviewed by Detective Corporal Thomas Nash ( tnash@bpdvt.org ), Burlington Vermont Police Department, Internet Crime against Children Task Force. Adjunct Instructor, Champlain College, Burlington VT. In this must read for any aspiring novice cybercrime investigator as well as the seasoned professional computer guru alike, Brett Shaver takes the reader into the ever changing and dynamic world of Cybercrime investigation.  Shaver, an experienced criminal investigator, lays out the details and intricacies of a computer related crime investigation in a clear and concise manner in his new easy to read publication, Placing the Suspect behind the Keyboard. Using Digital Forensics and Investigative techniques to Identify Cybercrime Suspect s . Shaver takes the reader from start to finish through each step of the investigative process in well organized and easy to follow sections, with real case file examples to reach the ultimate goal of any investigation: identifying the suspect and proving their guilt in the crime. Do not be fooled by the title. This excellent, easily accessible reference is beneficial to both criminal as well as civil investigations and should be in every investigator’s library regardless of their respective criminal or civil investigative responsibilities. (see PDF for full review)","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128863198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automating Vendor Fraud Detection in Enterprise Systems 企业系统中供应商欺诈检测的自动化
J. Digit. Forensics Secur. Law Pub Date : 2013-06-30 DOI: 10.15394/JDFSL.2013.1142
Kishore Singh, P. Best, J. Mula
{"title":"Automating Vendor Fraud Detection in Enterprise Systems","authors":"Kishore Singh, P. Best, J. Mula","doi":"10.15394/JDFSL.2013.1142","DOIUrl":"https://doi.org/10.15394/JDFSL.2013.1142","url":null,"abstract":"Fraud is a multi-billion dollar industry that continues to grow annually. Many organisations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper we adopt a Design-Science methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated be developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of this study are: i) automating routine data analytics improves auditor productivity and reduces time taken to identify potential fraud, and ii) visualisations assist in promptly identifying potentially fraudulent user activities. The study makes the following contributions: i) a model for proactive fraud detection, ii) methods for visualising user activities in transaction data, iii) a stand-alone MCL-based prototype.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121630385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2) 科技专区:法医数据可视化:证据指引(第二部分)
J. Digit. Forensics Secur. Law Pub Date : 2013-06-30 DOI: 10.15394/JDFSL.2013.1145
D. Schofield, K. Fowle
{"title":"Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2)","authors":"D. Schofield, K. Fowle","doi":"10.15394/JDFSL.2013.1145","DOIUrl":"https://doi.org/10.15394/JDFSL.2013.1145","url":null,"abstract":"Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example, network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an understanding of the subject matter. Courtroom environments are morphing into cinematic display environments, the media consumed by an audience who are increasingly visually literate and media savvy (Heintz, 2002). There are a number of fundamental implications inherent in the shift from oral to visual mediation and a number of facets of this modern evidence presentation technology needs to be investigated and analysed. One of the primary issues of visualisation is that no matter how coherent the data, there will always be conjecture and debate as to how the information is/has-been visualised and, is it presented in an acceptable and meaningful way. This paper presents a range of examples of where forensic data has been visualised using various techniques and technology, the paper then examines aspects of the visual courtroom evidence presented and discusses some of the benefits and potential problems of implementing this technology. This paper is part two of a two-part series that aims to describe the use of, and provide guidelines for, the use of graphical displays in courtrooms.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
System-Generated Digital Forensic Evidence in Graphic Design Applications 平面设计应用中系统生成的数字取证证据
J. Digit. Forensics Secur. Law Pub Date : 2013-06-10 DOI: 10.15394/JDFSL.2013.1151
Enos K. Mabuto, H. Venter
{"title":"System-Generated Digital Forensic Evidence in Graphic Design Applications","authors":"Enos K. Mabuto, H. Venter","doi":"10.15394/JDFSL.2013.1151","DOIUrl":"https://doi.org/10.15394/JDFSL.2013.1151","url":null,"abstract":"Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered from certain graphic design applications, which indicates that a counterfeit document was created. This inference is made by associating the digital forensic information gathered with the possible actions taken, more specifically, the scanning, editing, saving and printing of counterfeit documents. The digital forensic information is gathered by analysing the files generated by the particular graphic design application used for creating the document. The acquired digital forensic information is corroborated to the creation of counterfeit documents and interpreted accordingly. In the end determining if a system was utilised for counterfeiting.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117245901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信