77 research outputs found

    Possibilities of autopsy tool use for forensic purposes

    Get PDF
    The rapid development and widespread use of information technology has brought dramatic changes in all spheres of human activity. At the present time it is difficult to imagine how the world functioned without these technologies. However, despite all the advantages that it brings, information technology has opened various opportunities for misuse. This has caused the development of a new scientific discipline called digital forensics, which deals with the collection, preservation, analysis and presentation of digital evidence. Since digital evidence is very sensitive (easy to delete, modify, etc.), it cannot usually be detected and seen with the classic tools. Therefore, for this purpose, the use of specialized forensic tools is required, that can successfully identify such evidence. There are a number of forensic tools, commercial and non-commercial, which can be found on the market. Some of them are used for each step in the process of digital forensic investigations, and some are multi-functional. When talking about the differences between commercial and non-commercial tools, a frequently asked question is which tools are better, more reliable, faster, more functional, etc. This paper will describe the use of Autopsy, one of the most famous non-commercial forensic tools, and compare its properties with the commercial tool FTK (Forensic Toolkit)

    Specifičnost i bezbednost softverskog alata kao dela servisa za odgovor na hitan poziv u policiji

    Get PDF
    Service of permanent duty is one of the most important services on which work is performed and the to the police response to an emergency call that service is one of the most important tasks. This paper attempts to provide insight into the organization, activities and work of security services that deal with response to an emergency call, in order to point the necessity of implementing modern services which increase the level of prediction of the situation on the ground in real time and allow adequate time engagement and a more determined - faster reaction. The specificity of tools that should provide the information to the police command staff, which is responsible for the operation in case of an emergency call to the police, is reflected in the degree of accuracy, speed of incoming and the speed of data processing into information useful for constructing images of emergency declared by calling incidental or crisis situation. The aim is to determine the necessary methods and principles required in the implementation of tools for responding to an emergency call. It seems, on the one hand, the analysis of the results of previously implemented tools, both from the aspect of design and implementation, and exploitation as the most important assessment of the real effectiveness of each tool, and, on the other hand, to find the appropriate methodology solutions. Also, the paper presents function of one of the possible scenarios for implementing IKS, which especially divers attention to the security aspects which the necessity of implementation of the IKS is primarily related to the protection of sensitive information and prevent their abuse.Servis stalnog dežurstva je jedna od najvažnijih usluga na kojima se zasniva rad policije, a odgovor na hitan poziv u tom servisu je jedan od najvažnijih poslova. Ovaj rad pokuÅ”ava da pruži uvid u organizaciju, poslove i rad bezbednosnih službi koje ce bave odgovorom na hitan poziv, kako bi ukazao na neophodnost implementiranja savremenih servisa koji bi podigli nivo predviđanja situacije na terenu u realnom vremenu i tako omogućili adekvatnije angažovanje i odlučniju - bržu reakciju. Specifičnost alata koji treba da obezbedi informacije komandnom kadru policije, odgovornom za delovanje u slučaju hitnog poziva policiji, ogleda se u stepenu tačnosti, brzini prispeća i brzini obrade podataka u informaciju korisnu za građenje slike o hitnim pozivom prijavljenoj incidentnoj ili kriznoj situaciji. Cilj rada je utvrđivanje neophodnih metoda i principa pri realizaciji alata za odgovor na hitan poziv. To se čini, s jedne strane, analizom rezultata prethodno realizovanih alata, kako sa aspekta projektovanja i implementiranja, tako i eksploatisanja kao najbitnije ocene realne učinkovitosti svakog alata, i, s druge strane, pronalaženjem odgovarajuće metodologije reÅ”enja. U radu je prikazana funkcija jednog od mogućih scenarija implementiranja informaciono-komunikacionih sistema, koja posebno skreće pažnju na bezbednosne aspekte

    Possibilities of autopsy tool use for forensic purposes

    Get PDF
    The rapid development and widespread use of information technology has brought dramatic changes in all spheres of human activity. At the present time it is difficult to imagine how the world functioned without these technologies. However, despite all the advantages that it brings, information technology has opened various opportunities for misuse. This has caused the development of a new scientific discipline called digital forensics, which deals with the collection, preservation, analysis and presentation of digital evidence. Since digital evidence is very sensitive (easy to delete, modify, etc.), it cannot usually be detected and seen with the classic tools. Therefore, for this purpose, the use of specialized forensic tools is required, that can successfully identify such evidence. There are a number of forensic tools, commercial and non-commercial, which can be found on the market. Some of them are used for each step in the process of digital forensic investigations, and some are multi-functional. When talking about the differences between commercial and non-commercial tools, a frequently asked question is which tools are better, more reliable, faster, more functional, etc. This paper will describe the use of Autopsy, one of the most famous non-commercial forensic tools, and compare its properties with the commercial tool FTK (Forensic Toolkit)

    Inovativna internet podrŔka za elektronsku upravu u socioloŔkim, ekonomskim i bioloŔkim sistemima

    Get PDF
    This paper proposes a novel approach to facilitate and foster e-government optimization and automation through the use of advanced information retrieval methods and techniques, and advanced Web technologies, as well. The approach suggested in this article aims to consider interactive processes which are simple, effective, and based on the user's needs and capabilities, rather than the government's organizational structure or government business models. It should create the opportunity to evaluate and eliminate redundant or unnecessary processes as well as to reduce costs and cycle times by transitioning from the processes mainly based on human- related work to automated and more intelligent processes.U radu se predlaže novi pristup koji treba da olakÅ”a i podstakne optimizaciju i automatizaciju elektronske uprave koriŔćenjem naprednih metoda i tehnika pretrage kao i naprednih veb-tehnologija. Pristup predložen u ovom radu ima za cilj da razmotri interaktivne procese koji su jednostavni, efikasni i zasnovani na potrebama i sposobnostima korisnika, a ne na organizacionoj strukturi vlade ili njenim poslovnim modelima. On treba da omogući da se ocene i eliminiÅ”u suviÅ”ni ili nepotrebni procesi, kao i da se smanje troÅ”kovi i vreme ciklusa prelaskom sa procesa uglavnom zasnovanih na ljudskom radu na automatizovane i inteligentnije procese

    Praktična primena softverskih alata otvorenog koda u kriptografiji

    Get PDF
    Security of computer systems is becoming more important, because more users in more ways use more information in the computer world. With the development of information technologies and telecommunication systems and a greater diffusion in the geographical sense growing is also the possibility of misuse of data which are transferred through open and insecure communication paths which requires a more efficient protection. In the system of data transfer attackers can easily destroy data, modify them or the information can come into possession of unauthorized persons or organizations which can often have very heavy consequences. The problem is especially expressed in some organizations such as state administrations, banking, judicial, military, medical and other administrations. In this paper explained are basic terms related to crypts and algorithms which were used and which are used, as well as methods of data protection in computer networks based on cryptography in order to protect privacy inside a network of computers. Explained are symmetrical and asymmetrical cryptosystems and the technique of digital signature. Also, the subject of this paper is the presentation of the program CrypTool and CryptoWork flow, which belong to the most famous free ie. shareware software in the field of cryptography, with special emphasis on the possibility of applying different algorithms and comparative analysis of their work and are given concrete examples of their use.Sigurnost računarskih sistema oduvek je bitna, a danas postaje joÅ” važnija, jer sve viÅ”e korisnika na sve viÅ”e načina koristi sve viÅ”e informacija u sadaÅ”njem informatičkom svetu. Sa razvojem informacionih tehnologija i telekomunikacionih sistema i sve većom rasprostranjenoŔću ljudskog druÅ”tva u geografskom smislu raste i mogućnost zloupotreba podataka koji se prenose otvorenim komunikacijskim putevima, Å”to zahteva efikasniju zaÅ”titu. U sistemu prenosa podataka napadači mogu lako da uniÅ”te podatke, da ih modifikuju ili da informacije dođu u posed neovlaŔćenim osobama ili organizacijama, Å”to može imati vrlo teÅ”ke posledice. Problem je posebno izražen kod nekih organizacija kao Å”to su državne administracije, pravosudne, vojne, medicinske, bankarske ali i druge. U ovom radu su objaÅ”njeni osnovni pojmovi vezani za kriptovanje i algoritmi koji su se koristili i koji se koriste, kao i metode zaÅ”tite podataka u računarskim mrežama bazirane na kriptografiji kako bi se zaÅ”titila takozvano sveto trojstvo sigurnosti CIA (od početnih slova engleskih reči: poverljivost - confidentiality, integritet - integrity, dostupnost - availability) unutar mreže računara. U radu su objaÅ”njeni simetrični i asimetrični kriptosistemi i tehnika digitalnog potpisa. Takođe, predmet rada je predstavljanje programa CrypTool i CryptoWork flow, koji spadaju u najpoznatije slobodne, tj. shareware softvere u oblasti kriptografije, sa posebnim naglaskom na mogućnosti primene različitih algoritama, kao i komparativna analiza njihovog rada, a dati su i konkretni primeri njihovog koriŔćenja

    Application of homotopy perturbation method in solving coupled schrƶdinger and poisson equation in accumulation layer

    Get PDF
    In this manuscript, a novel approach for an approximate solving of coupled Schrodinger-Poisson (SP) equations in the accumulation layer of semiconductor is described. This approach, based on the homotopy perturbation method (HPM), gives an approximate analytic solution of SP system which at the same time has a relative simple mathematical form, as well as a high degree of accuracy. A good agreement between HPM solution and exact solution of SP system indicates on the utility and sufficiency of the HP method

    Alati za digitalnu forenziku

    Get PDF
    Computer forensics is a scientific discipline dealing with acquiring, collecting, storing and presenting data that are electronically processed and stored on computer media. Although a relatively new discipline, it has the potential to significantly influence the specific types of investigations and prosecutions. Computer forensics is significantly different than traditional forensic disciplines. First of all, tools and techniques that this discipline demands are relatively easily available to anyone who wants to conduct forensic analysis. Contrary to traditional forensic analysis, computer investigators need to conduct testing that is not always carried out in controlled conditions. Collecting digital evidence begins when information and/or physical objects are collected or stored in anticipation of testing. The term 'evidence' implies that the person who has collected it is recognized by the Court, so as the process of collecting evidence. Data or physical objects become evidence only when they are collected by an authorized person.Kompjuterska forenzika je naučna disciplina koja se bavi prikupljanjem, očuvanjem, analizom i prezentovanjem podataka koji su elektronski procesirani i uskladiÅ”teni na kompjuterskim medijima. Iako je relativno nova disciplina, ona ima potencijal da značajno utiče na specifične tipove istraga i krivičnih gonjenja. Kompjuterska forenzika se značajno razlikuje od tradicionalnih forenzičkih disciplina. Za početak, alati i tehnike koje ova disciplina zahteva, relativno su lako dostupni svakome ko želi da sprovede forenzičku analizu. Nasuprot tradicionalnim forenzičkim analizama, od kompjuterskih istražitelja se zahteva ispitivanje u uslovima koji nisu uvek kontrolisani. Prikupljanje digitalnih dokaza počinje kada se informacija i/ili fizički objekt prikupe ili sačuvaju u očekivanju ispitivanja. Termin 'dokaz' implicira da je osoba koja ga je prikupila prepoznata od strane Cuda, kao i sam proces prikupljanja. Podatak ili fizički objekt postaje dokaz jedino kada je prikupljen od strane ovlaŔćenog lica

    Alati za digitalnu forenziku

    Get PDF
    Computer forensics is a scientific discipline dealing with acquiring, collecting, storing and presenting data that are electronically processed and stored on computer media. Although a relatively new discipline, it has the potential to significantly influence the specific types of investigations and prosecutions. Computer forensics is significantly different than traditional forensic disciplines. First of all, tools and techniques that this discipline demands are relatively easily available to anyone who wants to conduct forensic analysis. Contrary to traditional forensic analysis, computer investigators need to conduct testing that is not always carried out in controlled conditions. Collecting digital evidence begins when information and/or physical objects are collected or stored in anticipation of testing. The term 'evidence' implies that the person who has collected it is recognized by the Court, so as the process of collecting evidence. Data or physical objects become evidence only when they are collected by an authorized person.Kompjuterska forenzika je naučna disciplina koja se bavi prikupljanjem, očuvanjem, analizom i prezentovanjem podataka koji su elektronski procesirani i uskladiÅ”teni na kompjuterskim medijima. Iako je relativno nova disciplina, ona ima potencijal da značajno utiče na specifične tipove istraga i krivičnih gonjenja. Kompjuterska forenzika se značajno razlikuje od tradicionalnih forenzičkih disciplina. Za početak, alati i tehnike koje ova disciplina zahteva, relativno su lako dostupni svakome ko želi da sprovede forenzičku analizu. Nasuprot tradicionalnim forenzičkim analizama, od kompjuterskih istražitelja se zahteva ispitivanje u uslovima koji nisu uvek kontrolisani. Prikupljanje digitalnih dokaza počinje kada se informacija i/ili fizički objekt prikupe ili sačuvaju u očekivanju ispitivanja. Termin 'dokaz' implicira da je osoba koja ga je prikupila prepoznata od strane Cuda, kao i sam proces prikupljanja. Podatak ili fizički objekt postaje dokaz jedino kada je prikupljen od strane ovlaŔćenog lica

    Zlonamerni programi

    Get PDF
    Today, during the epoch of informatics and human progress, there is a big interest for malware programs as well as for the programs used for protection against them. Malware is each program which has ability for moving into someone's computer system with intention to disable, or at least make difficult, work of this independent or network user. Natural residence of malware is Internet. It is impossible to give precise taxonomy of malware because their number is increased each day. The term computer virus is often wrongly used as universal phrase for all malware, including and real viruses.Danas, u informatičkoj epohi razvoja ljudskog druÅ”tva, postoji veliki interes za proučavanje zlonamernog programa (malware) i odgovarajućih programa za zaÅ”titu od njega. Zlonamerni ili nepoželjni program je svaki koji poseduje sposobnost useljavanja u računarski sistem korisnika u nameri da na bilo koji način oteža pa i onemogući rad samostalnog ili umreženog korisnika, pri čemu je prirodno staniÅ”te nepoželjnog programa Internet. Precizna taksonomija neopoželjnih programa je onemogućena pre svega njihovim svakodnevnim uvećavanjem. Pri tome se, često pogreÅ”no, termin kompjuterski virus upotrebljava kao sveobuhvatna fraza koja podrazumeva sve nepoželjne programe uključujući i prave viruse

    Zlonamerni programi

    Get PDF
    Today, during the epoch of informatics and human progress, there is a big interest for malware programs as well as for the programs used for protection against them. Malware is each program which has ability for moving into someone's computer system with intention to disable, or at least make difficult, work of this independent or network user. Natural residence of malware is Internet. It is impossible to give precise taxonomy of malware because their number is increased each day. The term computer virus is often wrongly used as universal phrase for all malware, including and real viruses.Danas, u informatičkoj epohi razvoja ljudskog druÅ”tva, postoji veliki interes za proučavanje zlonamernog programa (malware) i odgovarajućih programa za zaÅ”titu od njega. Zlonamerni ili nepoželjni program je svaki koji poseduje sposobnost useljavanja u računarski sistem korisnika u nameri da na bilo koji način oteža pa i onemogući rad samostalnog ili umreženog korisnika, pri čemu je prirodno staniÅ”te nepoželjnog programa Internet. Precizna taksonomija neopoželjnih programa je onemogućena pre svega njihovim svakodnevnim uvećavanjem. Pri tome se, često pogreÅ”no, termin kompjuterski virus upotrebljava kao sveobuhvatna fraza koja podrazumeva sve nepoželjne programe uključujući i prave viruse
    • ā€¦
    corecore