311 research outputs found

    The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption

    Get PDF
    A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This report examines the fundamental properties of these requirements and attempts to outline the technical risks, costs, and implications of deploying systems that provide government access to encryption keys

    Modelling, analysing and model checking commit protocols

    Get PDF

    Forensic imaging and analysis of Apple iOS devices

    Get PDF
    In this thesis we present our research on digital forensics on the iOS platform, structured along three areas: forensic imaging; forensic analysis; and anti-forensic techniques. In the field of forensic imaging, we demonstrate that the iPad can control external storage devices attached via USB, using Apple's Camera Connection Kit adapters. This results in a 30x speed boost compared to the traditional Wi-Fi transfer. In terms of forensic analysis, we found that printing documents wirelessly via AirPrint leaves a trace in the device that, when recovered, reveals the full contents of the documents that have been printed. Finally, in terms of anti-forensics, we created a proof-of-concept tool that disables a number of system services used by forensic tools to retrieve data. The tool also applies other hardening measures aimed at preventing the abuse of the services that remain activated.Esta tesis presenta nuestra investigaciĂłn sobre informĂĄtica forense en la plataforma iOS, estructurada en tres ĂĄreas: adquisiciĂłn forense; anĂĄlisis forense; y tĂ©cnicas anti-forenses. En el campo de adquisiciĂłn forense, demostramos que el iPad puede controlar dispositivos externos de almacenamiento conectados vĂ­a USB, usando los adaptadores del Apple Camera Connection Kit. Esto supone una velocidad de transferencia 30 veces superior a la transferencia vĂ­a Wi-Fi. En cuanto al anĂĄlisis forense, observamos que la impresiĂłn inalĂĄmbrica de documentos vĂ­a AirPrint deja un rastro en el dispositivo que, al ser recuperado, revela el contenido completo de los documentos que hayan sido impresos. Por Ășltimo, en el ĂĄmbito de tĂ©cnicas anti-forenses implementamos una herramienta como prueba de concepto que deshabilita determinados servicios del sistema usados por las herramientas forenses para extraer datos del dispositivo. La herramienta tambiĂ©n aplica otras medidas de seguridad para prevenir la explotaciĂłn de los servicios que continĂșen activados.Aquesta tesi presenta la nostra investigaciĂł sobre informĂ tica forense a la plataforma iOS, estructurada en tres Ă rees: adquisiciĂł forense; anĂ lisi forense; i tĂšcniques antiforenses. En el camp d'adquisiciĂł forense, demostrem que l'iPad pot controlar dispositius externs d'emmagatzematge connectats via USB, usant els adaptadors de l'Apple Camera Connection Kit. AixĂČ suposa una velocitat de transferĂšncia 30 vegades superior a la transferĂšncia via Wi-Fi. Pel que fa a l'anĂ lisi forense, observem que la impressiĂł sense fil de documents a partir d'AirPrint deixa un rastre al dispositiu que, en ser recuperat, revela el contingut complet dels documents que hagin estat impresos. Finalment, en l'Ă mbit de tĂšcniques antiforenses implementem una eina com a prova de concepte que deshabilita determinats serveis del sistema usats per les eines forenses per a extreure dades del dispositiu. L'eina tambĂ© aplica altres mesures de seguretat per a prevenir l'explotaciĂł dels serveis que continuĂŻn activats.TecnologĂ­as de la informaciĂłn y de rede

    Legal Risk Associated with Electronic Funds Transfer

    Get PDF
    The past thirty years have seen rapid advances in the technological component of banking services and as a consequence new legal issues have come to the fore, especially with regard to Electronic Fund Transfers (EFTs) which are now used to transfer money around the world, and have made fund transactions between payers and payees easier, faster and more secure. The method involves risks for both banks and customers, due to the possibility of unauthorized payments risks, credit and insolvency problems, and confidentiality issues. Most contracts and obligations now depend on the new technology, although there is a variety of methods for dealing with the concomitant risks. EFTs share a number of similarities with paper-based funds transfers in regard to methods of regulation, and the careful observer can identify patterns and themes. Today, the business world depends heavily on EFT systems for its procedures; and government and academia have also taken a keen interest in EFTs. This thesis reviews and examines the existing legal position of liability of banks and customers for risks associated with EFT transactions: unauthorized EFT instruction and the problem of customer identity, credit risk and privacy, especially, the systems employed for safeguarding the customer’s transactions and data. The thesis also makes recommendations for change. The rules for the allocation of risk are based on the various mechanisms used to access the account. Also, due to the complexities of EFT, consumer protection becomes a paramount goal and is a subject of much concern, particularly when it comes to determining liability for losses. The UK government implemented the Payment Services Directive 2007 by adopting the Payment Services Regulations 2009, to regulate the system. However, such Regulations do not constitute a comprehensive regime that applies to all legal issues arising in the context of the EFT system. This study argues the necessity for a re-examination of existing laws and proposes a model for the future approach to the issues associated with EFT payment. Different approaches to EFT will be assessed, and the comparative and contrasting elements will be analysed in order to propose a comprehensive solution to the deficiencies in the current framework. Central to the problem is the absence of any uniform standard: individual banks offer differing contractual terms and conditions and different means of accessing accounts. Consequently it is time to formulate new and comprehensive rules for the allocation of liability of risks associated with EFT transactions.Ministry of higher education and scientific Research/Republic of Ira

    The Value to the Organization of an Adaptive Approach to a Technologically Disruptive Environment

    Get PDF
    The purpose of this Capstone is to explore the possible roles Information Technology (IT) could play in the success of the organization as it transforms into a workplace capable of adapting to the disruptive nature of digital technology. This is accomplished by identifying the positive value to the organization provided by digital technology and social business tools; describing the disruptive nature of this new technology and the tools associated with it and its impact on the organization-as-a-whole; presenting some of the tensions and possibly evolving paradigm shifts within the organization as a result of the disruptive nature of digital technology and social business tools; evaluating predominant near-term operational models being considered by IT leadership and their responsiveness to this disruptive technology environment; and recommending a course of action that will provide an organization with the necessary tools required for continuously adapting to the uncontrollable and disruptive nature presented by the heavily digital technological environment that will most likely persist throughout the first quarter of this 21st century

    A study on the Improvements and Development of Electronic Bill of Lading in China

    Get PDF
    China is South Korean’s biggest trade partner, and the trade value between these two countries has increased 33 times for the 25 years. From the founding of Free Trade Area of China and South Korea, to the establishing of Maritime Silk Road among the Belt and Road Initiatives, and even to the vigorous development of cross-border e-commerce, all these have brought up new opportunities to the business of shipping and more challenges as well. The Bill of Lading is an essential part of maritime trade. Compared with the traditional bill of lading, the electronic bill of lading has its advantages in efficiency, safety and cost-saving. Therefore, the study in electronic bill of lading’s legal issues under China’s actual circumstances is, in fact, to study the development trends of future maritime trade, which will bear a certain academic Value. I was studying in South Korea, an early beginner and more developed country in the business of shipping. During my preparation of this thesis, through the comparison of the current bill of lading and EDI articles of law between China and South Korea, and among the legislations of bill of lading in other international organizations and countries, I try to find out the shortcomings of China’s legislation in electronic bill of lading and offer suggestions to improve the legislation. I will locate the legislation problems by analyzing two specific cases. This will generate a positive practical significance to the electronic bill of lading’s development in China and the comprehensive elevation of China’s shipping industry.Chapter I Introduction 1 1.1 Background and Purpose of Research 1 1.2 Method and Significance of Research 2 Chapter II Theoretical Investigation of Electronic Bill of Lading 4 2.1 traditional Bill of Lading and Electronic Bill of Lading 4 2.1.1 Meaning of traditional bill of lading 4 2.1.2 Electronic data interchange system (EDI) 6 2.1.3 Meaning and Background of Birth of the Electronic Bill of Lading 7 2.1.4 Operating model of Electronic Bill of Lading 8 2.2 Relevant Laws and Regulations of Electronic Bill of Lading 16 2.2.1 Corresponding legislation within the countries 16 2.2.1.1 Legislative status in the United States 16 2.2.1.2 Legislative status in Singapore 18 2.2.1.3 Legislative status in the United Kingdom 18 2.2.1.4 Legislative status in Australia 18 2.2.1.5 Legislative status in South Africa 19 2.2.1.6 The current situation of legislation in Japan 20 2.2.2 International legislations 21 2.2.2.1 CMI Rules on Electronic Bills of Lading enacted by the ComitĂ© Maritime International 22 2.2.2.2 Model Law on Electronic Commerce enacted by the United Nations Commission on International Trade Law 23 2.2.2.3 CMI/UNCITRAL Preliminary draft instrument on the carriage of goods by sea 24 2.2.2.4 Provisions of Rotterdam rules on Electronic Bill of Lading 25 2.2.3. The Development of Korean Electronic Bill of Lading and the Korean Legislations 28 2.2.3.1 The Development and legislation of EDI and E-commerce in Korea 28 2.2.3.2 Legislation on Electronic Bill of Lading in Korea 29 2.2.3.3 Korea Electronic Bill of Lading system 35 Chapter ⅱ Provisions and Legislations of Electronic Bill of Lading in China 37 3.1 Electronic Bill of Lading in the Chinese laws 37 3.1.1 Contract Law of the People's Republic of China 37 3.1.2 Provisional Regulations for the Implementation of Electronic Data Interchange (EDI) in the Foreign Trade of Guangdong Province 38 3.1.3 Electronic Signature Law of the People's Republic of China 40 3.1.4 E-commerce Law of People's Republic of China (draft) 42 3.2. Reference to international laws, problem about Legislation of Electronic Bill of Lading in China 43 3.2.1 Issues related to the definition of "data messages" and Electronic Bill of Lading 43 3.2.2 The problem of Electronic signature 45 3.2.3 Legal issues related to intermediary services of Electronic Bill of Lading (Registration Institution) 48 3.2.4 The legal problem of Electronic Bill of Lading realizing the function of traditional Bill of Lading 51 3.2.5 Problem about jurisdiction of the Electronic Bill of Lading 54 3.3 Comparison Regulation of Electronic Bill of Lading between China and Korea 60 3.3.1 The advantages and disadvantages of Korean Electronic Bill of Lading system 60 3.3.2 Compare the legislation between Korea and China. 61 3.3.3 Suggestions of legislation in China 62 Chapter Ⅳ Case of Electronic Bill of Lading in China 66 4.1 On the evidentiary effect of Electronic Bill of Lading from "the first case of China's Electronic signature" 66 4.1.1 The details of case and proceedings 66 4.1.2 Case Analysis and consideration on the evidential Power of Electronic Bill of Lading 67 4.1.3 Provisions on the validity of evidence of Electronic Bill of Ladinginternational 70 4.1.4 Only for the development of electronic bill of lading, there are still several problems in the legislation of Electronic Evidence in China. 76 4.1.5 My legislative suggestions 76 4.2 Analysis on the Security of Electronic Bill of Lading caused by a case 79 4.2.1 Case introduction 79 4.2.2 Case analysis 80 4.2.3 Network security and Electronic Bill of Lading 81 4.2.4 Legislation on network security in countries all around the world (to name just a few) 84 4.2.5 Legislation and problems related to cybercrime and network security in China 86 4.2.6 The Legislative consideration of China's Network Security Law referring to the key system in Korea's Network Security Law 88 Chapter â…€ Suggestions of Regulation for China Electronic Bill of Lading 94 5.1 Suggestions for amending China's Maritime Law 94 5.2 China Electronic Bill of Lading law (draft) 97 Chapter VI Conclusion 103 Chapter Ⅹ References 106 Chapter ⅩI Acknowledgements 113Maste
    • 

    corecore