713 research outputs found

    Are Mobile Device Examinations Practiced like \u27Forensics\u27?

    Get PDF
    Mobile device forensics is sometimes disparaged as not really being ‘forensics.’ This paper discusses the relationship between digital forensics and other forensic sciences, and the relationship of mobile device forensics to the broader field of digital forensics. It specifically addresses the question of whether mobile device forensics processes – and practices – rise to the level of suitable forensics quality

    The Impact of MD5 File Hash Collisions On Digital Forensic Imaging

    Get PDF
    The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash value

    Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory

    Get PDF
    Although one is unlikely to ever want to brute-force an Android lock pattern, many do wonder about the relative strength of the lock pattern versus a multidigit personal identification number (PIN). It becomes obvious pretty quickly that there are many more lock patterns than the 10,000 possible four-digit PINs

    Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions

    Get PDF
    This document is Dr. Kessler\u27s review of Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, edited by Kenneth J. Knapp. Information Science Reference, 2009. ISBN: 978-1-60566-326-5

    Digital Forensics: Everything Leaves a Trace in Cyberspace

    Get PDF
    What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard\u27s Principle --Overvie

    Book Review: Challenges to Digital Forensic Evidence

    Get PDF
    This issue presents the fifth Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler ([email protected]) or Glenn S. Dardick ([email protected])

    Book Review: Conquest in Cyberspace: National Security and Information Warfare

    Get PDF
    This is the Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler ([email protected]) or Glenn Dardick ([email protected])

    Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

    Get PDF
    This document is Dr. Kessler\u27s review of MAC OS X, iPod, and iPhone Forensic Analysis DVD Toolkit, edited by Jesse Varsalone. Syngress, 2009. ISBN: 978-1-59749-297-3

    Book Review: Challenges to Digital Forensic Evidence

    Get PDF
    This document is Dr. Kessler\u27s review of Challenges to Digital Forensic Evidence, by Fred Cohen. Fred Cohen & Associates, 2008. ISBN 1-878109-41-

    Digital Forensics: Everything Leaves a Trace in Cyberspace

    Get PDF
    What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard\u27s Principle --Overvie
    corecore