252 research outputs found
A Cost-benefit Analysis of Information Security Mitigation Methods for ORVIs
In this paper we reviewed the cost-benefit analysis of Information Security and applied to Organisations Responsible for Vulnerable Individuals (ORVIs). Our research investigates the mitigation value and cost effectiveness of mitigation methods which discussed findings based on business focus and evaluation. Research findings indicated metrics for calculations assumptions, as proposed in the research work and thus, determined that the relative data analysis presented for cost comparable scores of the mitigation methods adopted. It is recommended from our analysis that ORVIs implement Internal Penetration Testing alongside Policy implementation due to the added benefit this combination has for this specific use-case
On the Identification of Information Extracted from Windows Physical Memory
Forensic investigation of the physical memory of computer systems is gaining the attention of experts in the digital forensics community. Forensic investigators find it helpful to seize and capture data from the physical memory and perform post-incident analysis when identifying potential evidence. However, there have been few investigations which have identified the quantity and quality of information that can be recovered from only the computer system memory (RAM) while the application is still running. In this paper, we present the results of investigations carried out to identify relevant information that has been extracted from the physical memory of computer systems running Windows XP. We found fragments of partial evidence from allocated memory segments. This evidence was dispersed in the physical memory that had been allocated to the application. The identification of this information is useful to forensic investigators as this approach can uncover what a user is doing on the application which can be used as evidence
Recommended from our members
Power aware routing algorithms (PARA) in wireless mesh networks for emergency management
Wireless Mesh Networks (WMNs) integrate the advantages of WLANs and mobile Ad Hoc networks, which have become the key techniques of next-generation wireless networks in the context of emergency recovery. Wireless Mesh Networks (WMNs) are multi-hop wireless networks with instant deployment, self-healing, self-organization and self-configuration features. These capabilities make WMNs a promising technology for incident and emergency communication. An incident area network (IAN) needs a reliable and lively routing path during disaster recovery and emergency response operations when infrastructure-based communications and power resources have been destroyed and no routes are available. Power aware routing plays a significant role in WMNs, in order to provide continuous efficient emergency services. The existing power aware routing algorithms used in wireless networks cannot fully fit the characteristics of WMNs, to be used for emergency recovery. This paper proposes a power aware routing algorithm (PARA) for WMNs, which selects optimal paths to send packets, mainly based on the power level of next node along the path. This algorithm was implemented and tested in a proven simulator. The analytic results show that the proposed power node-type aware routing algorithm metric can clearly improve the network performance by reducing the network overheads and maintaining a high delivery ratio with low latency
Security and Privacy Issues in IoT Healthcare Application for Disabled Users in Developing Economies
In this paper, we explore the security and privacy issues of Internet of Things (IoT) healthcare applications for special needs users. IoT enables health-related organizations to lift important data from diverse sources in real-time and this helps in precise decision-making. The transformation of the health sector, required enhancement and efficiency of protective systems, thereby reducing data vulnerability and hence, providing opportunities for secure patient data, particularly, for special needs patients. A quantitative method for purposive sampling technique was adopted and eighty-eight respondents provided the process of how the IoT technology was utilised. Data findings indicated that IoT monitoring devices have the detective ability for a person with special needs living alone with problems related to vital signs of diseases or disabilities. Personal patient health records are integrated into the e-health Centre via IoT technologies. For data privacy, security, and confidentiality, patients' records are kept on Personal Health Record Systems (PHRS). The research revealed suspected breaches of information due to cyber-attacks on the probability of false data errors in the PHRS, leading to special needs personal data leakage
Endocrine disrupting compounds exposure and testis development in mammals
In the last few decades, there is substantial evidence that male reproductive function is deteriorating in humans and wildlife and this is associated with unintentional exposure to widely
used synthetic chemicals. Subsequently, much has been done to show that certain chemicals
in the environment adversely interfere with the developing fetal gonads of the laboratory animals. Some in vitro studies have demonstrated treatment-induced reproductive problems in offspring exposed to endocrine disrupting compounds (EDC) which are similar to those observed
in wildlife and human population. Few EDC studies have demonstrated that there are
certain periods of gestation when the developing fetus is highly sensitive and at risk of small endocrine changes. Similar observations have been made in the sewage sludge model, however, while animal studies have been insightful in providing valuable information about the range of effects that can be attributed to in utero exposure to EDCs, varying levels of maternal doses administered in different studies exaggerated extrapolation of these results to human. Thus the EDC concentration representative of fetal exposure levels is uncertain because of the complexities of its nature. So far, the level of fetal exposure can only be roughly estimated. There is substantial evidence from animal data to prove that EDCs can adversely affect
reproductive development and function in male and more has accumulated on the mechanisms by which they exert their effects. This paper therefore, reviews previous studies to highlight the extent to which testis development can be disrupted during fetal life
Child-mediated health communication: A conceptual framework for increasing stroke literacy in hard to reach populations
Effectively engaging economically-disadvantaged ethnic minority communities for promoting health has proved to be challenging for a variety of reasons, including factors related to healthcare access, literacy, inadequate or ineffective cultural appropriateness of materials, and the relatively low priority for health due to competing demands related to economic hardship. We have developed a framework of Child-Mediated Health Communication (CMHC), which focuses on children as channels for carrying out health promotion interventions to parents and other caregivers. CMHC is an innovative, alternative strategy for engaging this underserved population, where traditional methods of health promotion have not been successful. We discuss the theoretical foundation, development, and effectiveness of a CMHC framework in our stroke preparedness communication intervention, Hip Hop Stroke
Forensic extraction of user information in continuous block of evidence
Extraction of user information in the physical memory of Windows application is vital in today's digital investigation. Digital forensic community feels the urge for the development of tools and techniques in volatile memory analysis. However, there have been few investigations into the amount of relevant information that can be recovered from the application memory. In this research, we present the quantitative and qualitative results of experiments carried out on Windows applications. In conducting this research; we have identified the most commonly used applications on Windows systems, designed a methodology to capture data and processed that data. This research report the amount of evidence that was stored over time and recovered in continuous block of evidence in the physical memory
Recommended from our members
A cost-benefit analysis of information security mitigation methods for ORVIs
In this paper we reviewed the cost-benefit analysis of Information Security and applied to Organisations Responsible for Vulnerable Individuals (ORVIs). Our research investigates the mitigation value and cost effectiveness of mitigation methods which discussed findings based on business focus and evaluation. Research findings indicated metrics for calculations assumptions, as proposed in the research work and thus, determined that the relative data analysis presented for cost comparable scores of the mitigation methods adopted. It is recommended from our analysis that ORVIs implement Internal Penetration Testing alongside Policy implementation due to the added benefit this combination has for this specific use-case
Recommended from our members
On the identification of information extracted from Windows physical memory
Forensic investigation of the physical memory of computer systems is gaining the attention of experts in the digital forensics community. Forensic investigators find it helpful to seize and capture data from the physical memory and perform post-incident analysis when identifying potential evidence. However, there have been few investigations which have identified the quantity and quality of information that can be recovered from only the computer system memory (RAM) while the application is still running. In this paper, we present the results of investigations carried out to identify relevant information that has been extracted from the physical memory of computer systems running Windows XP. We found fragments of partial evidence from allocated memory segments. This evidence was dispersed in the physical memory that had been allocated to the application. The identification of this information is useful to forensic investigators as this approach can uncover what a user is doing on the application which can be used as evidence
Recommended from our members
FALI: time memory information of Windows computer systems
In today digital investigation, forensic application level information (FALI) has become an important part of digital forensic research. In this research, information stored on Windows computer systems was analysed. The user input gathered from the volatile memory (RAM) of Windows applications has been described as the most important aspect of digital forensic investigation. User input is made at set interval when the application is still opened. This research will report the quantitative assessment of forensically relevant information on Windows application
- …