452 research outputs found

    The Impact of MD5 File Hash Collisions On Digital Forensic Imaging

    Get PDF
    The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash value

    Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory

    Get PDF
    Although one is unlikely to ever want to brute-force an Android lock pattern, many do wonder about the relative strength of the lock pattern versus a multidigit personal identification number (PIN). It becomes obvious pretty quickly that there are many more lock patterns than the 10,000 possible four-digit PINs

    Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions

    Get PDF
    This document is Dr. Kessler\u27s review of Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, edited by Kenneth J. Knapp. Information Science Reference, 2009. ISBN: 978-1-60566-326-5

    Digital Forensics: Everything Leaves a Trace in Cyberspace

    Get PDF
    What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard\u27s Principle --Overvie

    Book Review: Challenges to Digital Forensic Evidence

    Get PDF
    This issue presents the fifth Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler ([email protected]) or Glenn S. Dardick ([email protected])

    Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Get PDF
    This is the Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler ([email protected]) or Glenn Dardick ([email protected])

    Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

    Get PDF
    This document is Dr. Kessler\u27s review of MAC OS X, iPod, and iPhone Forensic Analysis DVD Toolkit, edited by Jesse Varsalone. Syngress, 2009. ISBN: 978-1-59749-297-3

    Book Review: Digital Forensic Evidence Examination

    Get PDF
    This document is Dr. Kessler\u27s review of the second edition of Digital Forensic Evidence Examination by Fred Cohen. ASP Press, 2010. ISBN: 978-1-878109-45-

    Cybersecurity in the Maritime Domain

    Get PDF
    In 2017 and 2018, the maritime industry saw a record number of attempted—and many successful—frauds via email, phishing, or other means. Demonstrated and actual attacks on vessel networks, communication systems, and navigation systems have become practically routine. Port and shipping line networks are increasingly vulnerable to what appears to be increasingly targeted attacks against maritime systems

    Book Review: Digital Forensic Evidence Examination (2nd Ed.)

    Get PDF
    On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen\u27s Digital Forensic Evidence Examination. His book won\u27t actually tell you how to answer these questions but it will help you understand the difficulty in even trying to answer them with any level of certainty
    corecore