53,741 research outputs found
Security Incident Response Criteria: A Practitioner's Perspective
Industrial reports indicate that security incidents continue to inflict large financial losses on organizations.
Researchers and industrial analysts contend that there are fundamental problems with existing security
incident response process solutions. This paper presents the Security Incident Response Criteria (SIRC)
which can be applied to a variety of security incident response approaches. The criteria are derived from
empirical data based on in-depth interviews conducted within a Global Fortune 500 organization and
supporting literature. The research contribution of this paper is twofold. First, the criteria presented in this
paper can be used to evaluate existing security incident response solutions and second, as a guide, to
support future security incident response improvement initiatives
Patterns of information security postures for socio-technical systems and systems-of-systems
This paper describes a proposal to develop patterns
of security postures for computer based socio-technical systems and systems-of-systems. Such systems typically span many organisational boundaries, integrating multiple computer systems, infrastructures and organisational processes. The paper describes the motivation for the proposed work, and our approach to the development, specification, integration and validation of security patterns for socio-technical and system-of-system scale systems
The problems and challenges of managing crowd sourced audio-visual evidence
A number of recent incidents, such as the Stanley Cup Riots, the uprisings in the Middle East and the London riots have demonstrated the value of crowd sourced audio-visual evidence wherein citizens submit audio-visual footage captured on mobile phones and other devices to aid governmental institutions, responder agencies and law enforcement authorities to confirm the authenticity of incidents and, in the case of criminal activity, to identify perpetrators. The use of such evidence can present a significant logistical challenge to investigators, particularly because of the potential size of data gathered through such mechanisms and the added problems of time-lining disparate sources of evidence and, subsequently, investigating the incident(s). In this paper we explore this problem and, in particular, outline the pressure points for an investigator. We identify and explore a number of particular problems related to the secure receipt of the evidence, imaging, tagging and then time-lining the evidence, and the problem of identifying duplicate and near duplicate items of audio-visual evidence
National plan to combat cybercrime
Australia is a highly connected country - technology and the internet are crucial to Australia\u27s way of life.
However, while the potential of the internet and digital economy is clearly a massive opportunity for Australia, it is also quickly emerging as a key enabler for criminal activity.
In Australia, the term \u27cybercrime\u27 is used to describe both:
crimes directed at computers or other information communications technologies (ICTs) (such as hacking and denial of service attacks) and
crimes where computers or ICTs are an integral part of an offence (such as online fraud, identity theft and the distribution of child exploitation material).
Responsibility for combating the different forms of cybercrime in Australia is shared between Australian Government agencies state and territory agencies. All jurisdictions have criminal laws directed at the various forms of cybercrime.
The Australian Attorney-General\u27s Department has led the development of a National Plan to Combat Cybercrime, in consultation with Australian Government agencies, state and territory agencies
A user-oriented network forensic analyser: the design of a high-level protocol analyser
Network forensics is becoming an increasingly important tool in the investigation of cyber and computer-assisted crimes. Unfortunately, whilst much effort has been undertaken in developing computer forensic file system analysers (e.g. Encase and FTK), such focus has not been given to Network Forensic Analysis Tools (NFATs). The single biggest barrier to effective NFATs is the handling of large volumes of low-level traffic and being able to exact and interpret forensic artefacts and their context – for example, being able extract and render application-level objects (such as emails, web pages and documents) from the low-level TCP/IP traffic but also understand how these applications/artefacts are being used. Whilst some studies and tools are beginning to achieve object extraction, results to date are limited to basic objects. No research has focused upon analysing network traffic to understand the nature of its use – not simply looking at the fact a person requested a webpage, but how long they spend on the application and what interactions did they have with whilst using the service (e.g. posting an image, or engaging in an instant message chat). This additional layer of information can provide an investigator with a far more rich and complete understanding of a suspect’s activities. To this end, this paper presents an investigation into the ability to derive high-level application usage characteristics from low-level network traffic meta-data. The paper presents a three application scenarios – web surfing, communications and social networking and demonstrates it is possible to derive the user interactions (e.g. page loading, chatting and file sharing ) within these systems. The paper continues to present a framework that builds upon this capability to provide a robust, flexible and user-friendly NFAT that provides access to a greater range of forensic information in a far easier format
Recommended from our members
Recording Victim Video Statements as Evidence to Advance Legal Outcomes in Family Violence Cases (ReVEAL)
This Implementation Guide provides an overview of the video-recording practices currently in place across several Texas jurisdictions. It provides guidance and considerations for jurisdictions in the collection and use of video evidence in family violence cases. This guide is divided into seven sections, including this Background and Overview. The second section includes information for law enforcement on the purpose of video statements, how to develop and implement a video program, and considerations for sustaining a program. The third section focuses on prosecutorial practices for the use of video statements including legal considerations, coordination with partners, and victim engagement around the video statement. The fourth section provides specific information for victim advocates and includes considerations for victim privacy and confidentiality. The fifth section focuses on technology and equipment, with information on type of equipment, technology infrastructure, and efficient transfer of evidence between agencies. The sixth section is the Summary Report of the ReVEAL project. The Summary Report is a technical overview of the evaluation that includes major findings and links to the ReVEAL reports that were previously released. The seventh and final section is comprised of the appendices and provides sample protocols, site overviews, equipment charts, and additional resources that may be helpful to users of this guide. Throughout this guide, there are several examples of cases and practices that illustrate the specific issues that may present themselves when launching a video-recording program. These
examples highlight the complexities of the practice while using real world examples of how video impacts family violence cases,
victim safety, and privacy.IC2 Institut
- …