77 research outputs found
Possibilities of autopsy tool use for forensic purposes
The rapid development and widespread use of information technology has brought dramatic changes in all spheres of human activity. At the present time it is difficult to imagine how the world functioned without these technologies. However, despite all the advantages that it brings, information technology has opened various opportunities for misuse. This has caused the development of a new scientific discipline called digital forensics, which deals with the collection, preservation, analysis and presentation of digital evidence. Since digital evidence is very sensitive (easy to delete, modify, etc.), it cannot usually be detected and seen with the classic tools. Therefore, for this purpose, the use of specialized forensic tools is required, that can successfully identify such evidence. There are a number of forensic tools, commercial and non-commercial, which can be found on the market. Some of them are used for each step in the process of digital forensic investigations, and some are multi-functional. When talking about the differences between commercial and non-commercial tools, a frequently asked question is which tools are better, more reliable, faster, more functional, etc. This paper will describe the use of Autopsy, one of the most famous non-commercial forensic tools, and compare its properties with the commercial tool FTK (Forensic Toolkit)
SpecifiÄnost i bezbednost softverskog alata kao dela servisa za odgovor na hitan poziv u policiji
Service of permanent duty is one of the most important services on which work is performed and the to the police response to an emergency call that service is one of the most important tasks. This paper attempts to provide insight into the organization, activities and work of security services that deal with response to an emergency call, in order to point the necessity of implementing modern services which increase the level of prediction of the situation on the ground in real time and allow adequate time engagement and a more determined - faster reaction. The specificity of tools that should provide the information to the police command staff, which is responsible for the operation in case of an emergency call to the police, is reflected in the degree of accuracy, speed of incoming and the speed of data processing into information useful for constructing images of emergency declared by calling incidental or crisis situation. The aim is to determine the necessary methods and principles required in the implementation of tools for responding to an emergency call. It seems, on the one hand, the analysis of the results of previously implemented tools, both from the aspect of design and implementation, and exploitation as the most important assessment of the real effectiveness of each tool, and, on the other hand, to find the appropriate methodology solutions. Also, the paper presents function of one of the possible scenarios for implementing IKS, which especially divers attention to the security aspects which the necessity of implementation of the IKS is primarily related to the protection of sensitive information and prevent their abuse.Servis stalnog dežurstva je jedna od najvažnijih usluga na kojima se zasniva rad policije, a odgovor na hitan poziv u tom servisu je jedan od najvažnijih poslova. Ovaj rad pokuÅ”ava da pruži uvid u organizaciju, poslove i rad bezbednosnih službi koje ce bave odgovorom na hitan poziv, kako bi ukazao na neophodnost implementiranja savremenih servisa koji bi podigli nivo predviÄanja situacije na terenu u realnom vremenu i tako omoguÄili adekvatnije angažovanje i odluÄniju - bržu reakciju. SpecifiÄnost alata koji treba da obezbedi informacije komandnom kadru policije, odgovornom za delovanje u sluÄaju hitnog poziva policiji, ogleda se u stepenu taÄnosti, brzini prispeÄa i brzini obrade podataka u informaciju korisnu za graÄenje slike o hitnim pozivom prijavljenoj incidentnoj ili kriznoj situaciji. Cilj rada je utvrÄivanje neophodnih metoda i principa pri realizaciji alata za odgovor na hitan poziv. To se Äini, s jedne strane, analizom rezultata prethodno realizovanih alata, kako sa aspekta projektovanja i implementiranja, tako i eksploatisanja kao najbitnije ocene realne uÄinkovitosti svakog alata, i, s druge strane, pronalaženjem odgovarajuÄe metodologije reÅ”enja. U radu je prikazana funkcija jednog od moguÄih scenarija implementiranja informaciono-komunikacionih sistema, koja posebno skreÄe pažnju na bezbednosne aspekte
Possibilities of autopsy tool use for forensic purposes
The rapid development and widespread use of information technology has brought dramatic changes in all spheres of human activity. At the present time it is difficult to imagine how the world functioned without these technologies. However, despite all the advantages that it brings, information technology has opened various opportunities for misuse. This has caused the development of a new scientific discipline called digital forensics, which deals with the collection, preservation, analysis and presentation of digital evidence. Since digital evidence is very sensitive (easy to delete, modify, etc.), it cannot usually be detected and seen with the classic tools. Therefore, for this purpose, the use of specialized forensic tools is required, that can successfully identify such evidence. There are a number of forensic tools, commercial and non-commercial, which can be found on the market. Some of them are used for each step in the process of digital forensic investigations, and some are multi-functional. When talking about the differences between commercial and non-commercial tools, a frequently asked question is which tools are better, more reliable, faster, more functional, etc. This paper will describe the use of Autopsy, one of the most famous non-commercial forensic tools, and compare its properties with the commercial tool FTK (Forensic Toolkit)
Inovativna internet podrŔka za elektronsku upravu u socioloŔkim, ekonomskim i bioloŔkim sistemima
This paper proposes a novel approach to facilitate and foster e-government optimization and automation through the use of advanced information retrieval methods and techniques, and advanced Web technologies, as well. The approach suggested in this article aims to consider interactive processes which are simple, effective, and based on the user's needs and capabilities, rather than the government's organizational structure or government business models. It should create the opportunity to evaluate and eliminate redundant or unnecessary processes as well as to reduce costs and cycle times by transitioning from the processes mainly based on human- related work to automated and more intelligent processes.U radu se predlaže novi pristup koji treba da olakÅ”a i podstakne optimizaciju i automatizaciju elektronske uprave koriÅ”Äenjem naprednih metoda i tehnika pretrage kao i naprednih veb-tehnologija. Pristup predložen u ovom radu ima za cilj da razmotri interaktivne procese koji su jednostavni, efikasni i zasnovani na potrebama i sposobnostima korisnika, a ne na organizacionoj strukturi vlade ili njenim poslovnim modelima. On treba da omoguÄi da se ocene i eliminiÅ”u suviÅ”ni ili nepotrebni procesi, kao i da se smanje troÅ”kovi i vreme ciklusa prelaskom sa procesa uglavnom zasnovanih na ljudskom radu na automatizovane i inteligentnije procese
PraktiÄna primena softverskih alata otvorenog koda u kriptografiji
Security of computer systems is becoming more important, because more users in more ways use more information in the computer world. With the development of information technologies and telecommunication systems and a greater diffusion in the geographical sense growing is also the possibility of misuse of data which are transferred through open and insecure communication paths which requires a more efficient protection. In the system of data transfer attackers can easily destroy data, modify them or the information can come into possession of unauthorized persons or organizations which can often have very heavy consequences. The problem is especially expressed in some organizations such as state administrations, banking, judicial, military, medical and other administrations. In this paper explained are basic terms related to crypts and algorithms which were used and which are used, as well as methods of data protection in computer networks based on cryptography in order to protect privacy inside a network of computers. Explained are symmetrical and asymmetrical cryptosystems and the technique of digital signature. Also, the subject of this paper is the presentation of the program CrypTool and CryptoWork flow, which belong to the most famous free ie. shareware software in the field of cryptography, with special emphasis on the possibility of applying different algorithms and comparative analysis of their work and are given concrete examples of their use.Sigurnost raÄunarskih sistema oduvek je bitna, a danas postaje joÅ” važnija, jer sve viÅ”e korisnika na sve viÅ”e naÄina koristi sve viÅ”e informacija u sadaÅ”njem informatiÄkom svetu. Sa razvojem informacionih tehnologija i telekomunikacionih sistema i sve veÄom rasprostranjenoÅ”Äu ljudskog druÅ”tva u geografskom smislu raste i moguÄnost zloupotreba podataka koji se prenose otvorenim komunikacijskim putevima, Å”to zahteva efikasniju zaÅ”titu. U sistemu prenosa podataka napadaÄi mogu lako da uniÅ”te podatke, da ih modifikuju ili da informacije doÄu u posed neovlaÅ”Äenim osobama ili organizacijama, Å”to može imati vrlo teÅ”ke posledice. Problem je posebno izražen kod nekih organizacija kao Å”to su državne administracije, pravosudne, vojne, medicinske, bankarske ali i druge. U ovom radu su objaÅ”njeni osnovni pojmovi vezani za kriptovanje i algoritmi koji su se koristili i koji se koriste, kao i metode zaÅ”tite podataka u raÄunarskim mrežama bazirane na kriptografiji kako bi se zaÅ”titila takozvano sveto trojstvo sigurnosti CIA (od poÄetnih slova engleskih reÄi: poverljivost - confidentiality, integritet - integrity, dostupnost - availability) unutar mreže raÄunara. U radu su objaÅ”njeni simetriÄni i asimetriÄni kriptosistemi i tehnika digitalnog potpisa. TakoÄe, predmet rada je predstavljanje programa CrypTool i CryptoWork flow, koji spadaju u najpoznatije slobodne, tj. shareware softvere u oblasti kriptografije, sa posebnim naglaskom na moguÄnosti primene razliÄitih algoritama, kao i komparativna analiza njihovog rada, a dati su i konkretni primeri njihovog koriÅ”Äenja
Application of homotopy perturbation method in solving coupled schrƶdinger and poisson equation in accumulation layer
In this manuscript, a novel approach for an approximate solving of coupled Schrodinger-Poisson (SP) equations in the accumulation layer of semiconductor is described. This approach, based on the homotopy perturbation method (HPM), gives an approximate analytic solution of SP system which at the same time has a relative simple mathematical form, as well as a high degree of accuracy. A good agreement between HPM solution and exact solution of SP system indicates on the utility and sufficiency of the HP method
Alati za digitalnu forenziku
Computer forensics is a scientific discipline dealing with acquiring, collecting, storing and presenting data that are electronically processed and stored on computer media. Although a relatively new discipline, it has the potential to significantly influence the specific types of investigations and prosecutions. Computer forensics is significantly different than traditional forensic disciplines. First of all, tools and techniques that this discipline demands are relatively easily available to anyone who wants to conduct forensic analysis. Contrary to traditional forensic analysis, computer investigators need to conduct testing that is not always carried out in controlled conditions. Collecting digital evidence begins when information and/or physical objects are collected or stored in anticipation of testing. The term 'evidence' implies that the person who has collected it is recognized by the Court, so as the process of collecting evidence. Data or physical objects become evidence only when they are collected by an authorized person.Kompjuterska forenzika je nauÄna disciplina koja se bavi prikupljanjem, oÄuvanjem, analizom i prezentovanjem podataka koji su elektronski procesirani i uskladiÅ”teni na kompjuterskim medijima. Iako je relativno nova disciplina, ona ima potencijal da znaÄajno utiÄe na specifiÄne tipove istraga i kriviÄnih gonjenja. Kompjuterska forenzika se znaÄajno razlikuje od tradicionalnih forenziÄkih disciplina. Za poÄetak, alati i tehnike koje ova disciplina zahteva, relativno su lako dostupni svakome ko želi da sprovede forenziÄku analizu. Nasuprot tradicionalnim forenziÄkim analizama, od kompjuterskih istražitelja se zahteva ispitivanje u uslovima koji nisu uvek kontrolisani. Prikupljanje digitalnih dokaza poÄinje kada se informacija i/ili fiziÄki objekt prikupe ili saÄuvaju u oÄekivanju ispitivanja. Termin 'dokaz' implicira da je osoba koja ga je prikupila prepoznata od strane Cuda, kao i sam proces prikupljanja. Podatak ili fiziÄki objekt postaje dokaz jedino kada je prikupljen od strane ovlaÅ”Äenog lica
Alati za digitalnu forenziku
Computer forensics is a scientific discipline dealing with acquiring, collecting, storing and presenting data that are electronically processed and stored on computer media. Although a relatively new discipline, it has the potential to significantly influence the specific types of investigations and prosecutions. Computer forensics is significantly different than traditional forensic disciplines. First of all, tools and techniques that this discipline demands are relatively easily available to anyone who wants to conduct forensic analysis. Contrary to traditional forensic analysis, computer investigators need to conduct testing that is not always carried out in controlled conditions. Collecting digital evidence begins when information and/or physical objects are collected or stored in anticipation of testing. The term 'evidence' implies that the person who has collected it is recognized by the Court, so as the process of collecting evidence. Data or physical objects become evidence only when they are collected by an authorized person.Kompjuterska forenzika je nauÄna disciplina koja se bavi prikupljanjem, oÄuvanjem, analizom i prezentovanjem podataka koji su elektronski procesirani i uskladiÅ”teni na kompjuterskim medijima. Iako je relativno nova disciplina, ona ima potencijal da znaÄajno utiÄe na specifiÄne tipove istraga i kriviÄnih gonjenja. Kompjuterska forenzika se znaÄajno razlikuje od tradicionalnih forenziÄkih disciplina. Za poÄetak, alati i tehnike koje ova disciplina zahteva, relativno su lako dostupni svakome ko želi da sprovede forenziÄku analizu. Nasuprot tradicionalnim forenziÄkim analizama, od kompjuterskih istražitelja se zahteva ispitivanje u uslovima koji nisu uvek kontrolisani. Prikupljanje digitalnih dokaza poÄinje kada se informacija i/ili fiziÄki objekt prikupe ili saÄuvaju u oÄekivanju ispitivanja. Termin 'dokaz' implicira da je osoba koja ga je prikupila prepoznata od strane Cuda, kao i sam proces prikupljanja. Podatak ili fiziÄki objekt postaje dokaz jedino kada je prikupljen od strane ovlaÅ”Äenog lica
Zlonamerni programi
Today, during the epoch of informatics and human progress, there is a big interest for malware programs as well as for the programs used for protection against them. Malware is each program which has ability for moving into someone's computer system with intention to disable, or at least make difficult, work of this independent or network user. Natural residence of malware is Internet. It is impossible to give precise taxonomy of malware because their number is increased each day. The term computer virus is often wrongly used as universal phrase for all malware, including and real viruses.Danas, u informatiÄkoj epohi razvoja ljudskog druÅ”tva, postoji veliki interes za prouÄavanje zlonamernog programa (malware) i odgovarajuÄih programa za zaÅ”titu od njega. Zlonamerni ili nepoželjni program je svaki koji poseduje sposobnost useljavanja u raÄunarski sistem korisnika u nameri da na bilo koji naÄin oteža pa i onemoguÄi rad samostalnog ili umreženog korisnika, pri Äemu je prirodno staniÅ”te nepoželjnog programa Internet. Precizna taksonomija neopoželjnih programa je onemoguÄena pre svega njihovim svakodnevnim uveÄavanjem. Pri tome se, Äesto pogreÅ”no, termin kompjuterski virus upotrebljava kao sveobuhvatna fraza koja podrazumeva sve nepoželjne programe ukljuÄujuÄi i prave viruse
Zlonamerni programi
Today, during the epoch of informatics and human progress, there is a big interest for malware programs as well as for the programs used for protection against them. Malware is each program which has ability for moving into someone's computer system with intention to disable, or at least make difficult, work of this independent or network user. Natural residence of malware is Internet. It is impossible to give precise taxonomy of malware because their number is increased each day. The term computer virus is often wrongly used as universal phrase for all malware, including and real viruses.Danas, u informatiÄkoj epohi razvoja ljudskog druÅ”tva, postoji veliki interes za prouÄavanje zlonamernog programa (malware) i odgovarajuÄih programa za zaÅ”titu od njega. Zlonamerni ili nepoželjni program je svaki koji poseduje sposobnost useljavanja u raÄunarski sistem korisnika u nameri da na bilo koji naÄin oteža pa i onemoguÄi rad samostalnog ili umreženog korisnika, pri Äemu je prirodno staniÅ”te nepoželjnog programa Internet. Precizna taksonomija neopoželjnih programa je onemoguÄena pre svega njihovim svakodnevnim uveÄavanjem. Pri tome se, Äesto pogreÅ”no, termin kompjuterski virus upotrebljava kao sveobuhvatna fraza koja podrazumeva sve nepoželjne programe ukljuÄujuÄi i prave viruse
- ā¦