229 research outputs found

    An investigation into the efficiency of forensic data erasure tools for removable usb flash memory storage devices

    Get PDF
    Securely erasing data is of key importance to anyone that is concerned with the security of their sensitive information, whether an individual or an organization. Simply deleting the data in question or formatting the storage device is not enough to ensure that the data cannot be recovered. Furthermore, with the uptake of Universal Serial Bus drives (USBs) flash memory based storage devices have replaced previous portable secondary storage media. Therefore, it is of a major concern whether these tools and products developed for securely erasing data secondary storage Hard Disk Drives (HDDs) would be as efficient when targeting the USB flash memory storage devices. With a wide range of open source and commercial products available on the market, all claiming, among other things, to be able to securely delete your data, it is quite a difficult task for the consumer to pick the most efficient product. This paper therefore discusses the results of experiments conducted with both the open source and commercial tools which claim to securely delete data off USB flash memory storage devices

    An Investigation Into The Efficiency Of Forensic Data Erasure Tools For Removable Usb Flash Memory Storage Devices

    Get PDF
    Securely erasing data is of key importance to anyone that is concerned with the security of their sensitive information, whether an individual or an organization. Simply deleting the data in question or formatting the storage device is not enough to ensure that the data cannot be recovered. Furthermore, with the uptake of Universal Serial Bus drives (USBs) flash memory based storage devices have replaced previous portable secondary storage media. Therefore, it is of a major concern whether these tools and products developed for securely erasing data secondary storage Hard Disk Drives (HDDs) would be as efficient when targeting the USB flash memory storage devices. With a wide range of open source and commercial products available on the market, all claiming, among other things, to be able to securely delete your data, it is quite a difficult task for the consumer to pick the most efficient product. This paper therefore discusses the results of experiments conducted with both the open source and commercial tools which claim to securely delete data off USB flash memory storage devices

    A forensics overview and analysis of USB flash memory devices

    Get PDF
    Current forensic tools for examination of embedded systems like mobile phones and PDAs mostly perform data extraction on a logical level and do not consider the type of storage media during data analysis. This report suggests different low level approaches for the forensic examination of flash memories and describes three lowlevel data acquisition methods for making full memory copies of flash memory devices. Results of a file system study in which USB memory sticks from 45 different make and models were used are presented. For different mobile phones, this paper shows how full memory copies of their flash memories can be made and which steps are needed to translate the extracted data into a format that can be understood by common forensic media analysis tools. Artefacts, caused by flash specific operations like block erasing and wear levelling, are discussed and directions are given for enhanced data recovery and analysis of data originating from flash memory

    Implementasi Botnet Sederhana Menggunakan Bahasa Pemrograman C Dan C&C Server Berbasis Linux

    Get PDF
    Botnet menjadi ancaman yang serius dalam keamanan jaringan. Botnet sering disalahgunakan untuk melancarkan serangan dan merusak serta mencuri informasi sensitif. Penelitian ini bertujuan untuk mengimplementasikan sebuah botnet sederhana menggunakan bahasa pemrograman C dan Command and Control (C&C) Server berbasis linux. Metode yang digunakan melibatkan pengembangan aplikasi bot yang berjalan di sistem operasi Windows dan mampu melakukan komunikasi dengan C&C Server. Penyebaran bot melalui mekanisme klik berupa berkas phising yang ditempatkan pada USB flash memory. Hasil penelitian menunjukkan bahwa implementasi botnet sederhana menggunakan bahasa pemrograman C dan C&C server berbasis Linux memungkinkan penulis memahami mekanisme dasar dalam operasi dan struktur botnet. Penelitian ini memberikan wawasan yang berharga tentang cara kerja botnet dan pentingnya pengembangan strategi keamanan yang efektif untuk melawan ancaman botnet

    Changing Trends in ICT Use - A Generation Y Analysis

    Get PDF

    GNSS/RFID active transponder design

    Get PDF
    The paper describes a design of global navigation satellite system (GNSS)/Radio frequency identification (RFID) active transponder which is primarily designed for localization of objects as a part of localization system designated for efficient handling of situations with mass casualties. The precise localization is improved by differential GNSS. The block diagram of such GNSS/RFID active transponder is described including main operation procedures of the firmware. Measurement of the localization by algorithms of RTKLIB library and by algorithms of GNSS module is compared. Dynamic tests, i.e. GNSS/RFID active transponder placed in the moving car (50~kmph), and static tests, i.e. GNSS/RFID active transponder placed in the position for 15~min, are performed

    Tennessee Imports: A First Look

    Get PDF
    For the first time since the mid-1980s, the Census Bureau's Foreign Trade Division is compiling U.S. import statistics at the state level. What picture emerges from this first look at the state’s imports in some years?Tennessee, imports, trade,exports, exporting, global commerce, first quarter 2010, 1st quarter 2010

    The impace of custom ROM backups on android external storage erasure

    Get PDF
    The Android operating system is the current market leader on mobile devices such as smartphones and tablet computers. The core operating system is open source and has a number of developers creating variants of this operating system. These variants, often referred to as custom ROMs are available for a wide number of mobile devices. Custom ROMs provide a number of features, such as enhanced control over the operating system, variation in user interfaces and so on. The process of installing custom ROMs is often accomplished through the use of a ROM manager application. Such applications often provide mechanisms to back up the contents of the mobile device prior to upgrade. This mechanism is utilised in the case of a failed update to restore the device to its previous functional state. Backups produced in this manner are often stored in on an external media such as a micro-SD card.In the conducted research we evaluated devices inbuilt data erasure mechanisms within the context of erasure of backups produced by ROM managers. It was found that simply using the devices Format External / SD function is not an effective means of completely erasing these backups. Once recovered, these backups offer a quick source of information that a potential attacker could carve to retrieve user files such as media transferred to the external or from applications. Although the same files could be recovered from an image of the external storage itself, the carving process is more efficient than traditional carving methods
    • …
    corecore