9 research outputs found
Usage and Awareness of Cloud Computing Applications by Library Professionals of Sindh Province
The aim of the study is examine the usage and awareness level of cloud computing applications by library professionals of Sindh province. Methods- This study was quantitative survey based. The population of the study was library professionals who are working in different types of libraries likewise academic, special and community libraries of Sindh province. Sampling technique was random simple sample size was 165 library professionals (library assistant, assistant librarian, deputy librarian, librarian. Questionnaire was prepared in google form and distributed by email to selected respondents. Results- The result declared that knowledge and awareness of library professionals regarding cloud computing application is not very significant. Majority of library professionals are using cloud computing applications for their personal purposes not publically due to security of data.
Practical Implication(s): This study will helpful for university administration as well as welfare department of government and development sectors to implementations of cloud computing and level of knowledge of library professionals
Applying Memory Forensics to Rootkit Detection
Volatile memory dump and its analysis is an essential part of digital
forensics. Among a number of various software and hardware approaches for
memory dumping there are authors who point out that some of these approaches
are not resilient to various anti-forensic techniques, and others that require
a reboot or are highly platform dependent. New resilient tools have certain
disadvantages such as low speed or vulnerability to rootkits which directly
manipulate kernel structures e.g. page tables. A new memory forensic system -
Malware Analysis System for Hidden Knotty Anomalies (MASHKA) is described in
this paper. It is resilient to popular anti-forensic techniques. The system can
be used for doing a wide range of memory forensics tasks. This paper describes
how to apply the system for research and detection of kernel mode rootkits and
also presents analysis of the most popular anti-rootkit tools.Comment: 25 pages, 3 figures, 8 tables. Paper presented at the Proceedings of
the 9th annual Conference on Digital Forensics, Security and Law (CDFSL),
115-141, Richmond, VA, USA. (2014, May 28-29
The Evolution of Expressing and Exchanging Cyber-Investigation Information in a Standardized Form
The growing number of investigations involving digital traces from various data sources is driving the demand for a standard way to represent and exchange pertinent information. Enabling automated combination and correlation of cyber-investigation information from multiple systems or organizations enables more efficient and comprehensive analysis, reducing the risk of mistakes and missed opportunities. These needs are being met by the evolving open-source, community-developed specification language called CASE, the Cyber-investigation Analysis Standard Expression. CASE leverages the Unified Cyber Ontology (UCO), which abstracts and expresses concepts that are common across multiple domains. This paper introduces CASE and UCO, explaining how they improve upon prior related work. The value of fully-structured data, representing provenance, and action lifecycles are discussed. The guiding principles of CASE and UCO are presented, and illustrative examples of CASE are provided using the default JSON-LD serialization
Recommended from our members
Leveraging digital forensics and data exploration to understand the creative work of a filmmaker: a case study of Stephen Dwoskin’s digital archive
This paper aims to establish digital forensics and data exploration as a methodology for supporting archival practice and research into a filmmaker's creative processes. We approach this by exploring the digital legacy hard drives of the late artist Stephen Dwoskin (1939-2012), who is recognised as an influential filmmaker at the forefront of the shift from analogue to digital film production. The research findings of this case study show that digital forensics is effective in extracting a timeline of hard drive activities, data that can be explored to reveal clues about the artist’s personal/professional history, stages of creative processes, and technical environment. The paper further demonstrates how this is related to current thinking around user-centred archival workflow and understanding of creative processes. The broader impact of the work for advancing digital archiving and research into creative processes is highlighted, concluding with a discussion of how, going forward, the approach can be coupled with deeper content analysis to reveal what influences editing choices taking place over time
KONFERENCIAKÖTET – VÁLOGATOTT TANULMÁNYOK
FINTECH – DEFI - KRIPTOESZKÖZÖK GAZDASÁGI ÉS JOGI LEHETŐSÉGEI ÉS KOCKÁZATAI2021.11.04Onlin
Smurf : A reliable method for contextualising social media artefacts
© Cranfield University 2020. All rights reserved. No part of
this publication may be reproduced without the written
permission of the copyright ownerThis research aims to evaluate whether artefacts other than the content of user com munication on social media can be used to attribute actions or relationships to a user.
Social Media has enhanced the way users communicate on the Internet; providing
the means for users to share content in real-time, and to establish connections and
social relationships with like-minded individuals. However, as with all technology,
social media can be leveraged for disagreeable and/or unlawful activities such as
cyber bullying, trolling, grooming, or luring. There are reported cases where evidence from social media was used to secure
convictions; for example, the tragic cases of Ashleigh Hall in 2009 and Kayleigh
Haywood in 2015. The social media evidence e.g. the messages sent to the victim to
arrange a meet up was used to link the suspect to the victim, and attribute actions
to the suspect; in addition to other physical evidence presented as part of the case.
Investigations with elements of social media is growing within digital forensics. This
reinforces the need for a technique that can be used to make inferences about user
actions and relationships, especially during a live triage investigation where the
information needs to be obtained as quickly as possible. This research evaluates the use of live triage in the investigation of social media
interactions, in order to determine the reliability of such a technique as a means
of contextualising user activity, and attributing relationships or actions to a user.
This research also evaluates the reliability of artefacts other than the actual content
exchanged on social media; in the event that the content of communication is not
immediately accessible/available to the investigator. To achieve this, it was important
to break down the events that occur before, during and after user activity on social
media; followed by the determination of what constitutes communication content in
the context of this research. This research makes the following contributions: establishes a method for the cat egorisation of social media artefacts based on perceived user activity; communication
content was characterised, thus highlighting evidential data of interest from user
social media activity; the criteria for assessing the reliability of social media artefacts
in a live triage investigation was proposed; a novel framework for social media
investigation was developed with a Proof of Concept (PoC) to test its viability. The
PoC demonstrates that it is possible to attribute actions or relationships to a user,
using artefacts other than the actual content exchanged on social media.Ph