Investigation of Non-traditional Equipment: Autos, Washers,
|
|
- Vanessa Stephens
- 5 years ago
- Views:
Transcription
1 Investigation of Non-traditional Equipment: Autos, Washers, By: Ryan Ware Digital Forensics October 17, 2006
2 Executive Summary: Traditional digital forensics investigations usually involve the retrieval and examination of information from personal computers, mass storage devices such as tape drives and USB drives, and network related devices. So, most investigators will encounter cases in which information most relevant information is provided by those traditional devices. However, cases do arise and will arise in which traditional equipment does not provide sufficient evidence. Thus, the investigator may need to search for non-traditional sources of digital evidence. However, there are many potential sources most of which would not normally be thought of as an actual source of information. Also, for many of these devices, there do not exist any tools, policies, or procedures that will aide with the extraction of useful evidence from the devices. Research and work must be done to provide tools and policies for the extraction of digital evidence from nontraditional equipment.
3 Digital Forensics Problem: With the development of new and improved technology these days, the of use electronic equipment continues to grow. As everyone knows, personal computers are becoming better and better allowing criminals to use them with greater success in their illegal actions. These developments cause a significant problem for digital forensics investigators who not only have to keep up-to-date with new technology but must also become very familiar with both new and old forensics techniques. To complicate things further, personal computers are not the only source of digital evidence. In fact, there are so many potential sources that most people, even digital forensics investigators, do not often think of these non-traditional electronic equipment as sources of evidence. Since these sources often go unnoticed, some useful evidence may be missed entirely. Sources of Non-Traditional Forensics Evidence: Embedded systems probably present the widest variety of potential digital evidence. These embedded systems may be found almost anywhere. The most visible and well-known form of embedded systems are cell phones and hand-held devices such as PDAs. However, there are many more sources of digital evidence. Some other known sources include: printers, fax machines, copiers, scanners, and cameras. There are even more devices that people do not often think of as evidence providers. These machines may include: digital watches, global positioning systems (GPS), VCRs, answering machines, game consoles, automobiles, and common household appliances such as dish washers. Thankfully, most people, even criminals, do not often use these non-traditional storage devices to store information other than what was intended to be stored on those devices. So, this means that
4 most investigators will only deal with traditional devices such as personal computers. Unfortunately, this means that, when faced with some non-traditional devices as potential evidence, most digital forensics investigators will either be unable to properly extract the important information or not even consider the device as an important source of information. Also, this means that very few tools, policies, and procedures have been developed to extract information from these non-traditional sources of evidence. While these non-traditional devices do not always provide useful digital evidence, they must not be overlooked. These devices may provide important evidence that can make or break a case that did not have sufficient evidence based on evidence gather via traditional means. The information provided by these devices may often be untouched by the criminal because many people often overlook these devices. They may provide a time line, phone numbers, calendars, appointments, contact information, voice recordings, or even visual recordings. Most of these non-conventional sources of evidence will even store information about someone or something without that person's knowledge. Since these machines may provide useful information, investigators must keep these appliances in mind and understand most of their capabilities and the information that may be stored on them. Recently, several non-traditional devices have gained publicity on their potential for either criminal purposes or source of digital evidence for investigators. Some computer systems on newer automobiles have shown some significant potential for criminal exploitation. Game consoles have also been used to store some important information, and new appliances such as dish washers may possess some potential for exploitation.
5 Automobiles: Recently, more automobiles have been created with two rather interesting features. One feature involves the use of bluetooth devices to allow cell phones and other devices with bluetooth capabilities to interact with the car. The second feature is a marked increase in electronic equipment and software to allow for easier use of the car. Both of these increase the customer's comfort. However, they also increase potential for exploitation by a not so welcome person. The increased use of software and electronic equipment in newer cars has provided extra comfort and, to some degree, extra security. However, increased complexity within a system allows for more potential exploits. For example, the increased use of software and bluetooth devices makes some new cars vulnerable to viruses. According to Kaspersky Labs, a Russian anti-virus firm, Lexus vehicles and possibly other vehicles have the potential to be infected by viruses. These viruses may be introduced by infected cell phones on cars with operating systems similar to cell phone operating systems. The viruses may affect the navigation systems, security systems, or other electronic systems within a car [1]. Further, some automobiles with keyless entry and keyless ignition have been broken into wirelessly. Apparently, the security in these systems are not very strong due to the fact that they use embedded systems and, therefore, do not have the capability to utilize some of the stronger encryption algorithms and other security features [4]. If any of these automobile features were exploited in a crime, a digital forensics investigator must be able to retrieve any relevant information from any technology involved. There are currently several tools that can retrieve information from cell phones. One such tool is called Paraben's Device Seizure and is produced by Paraben Corporation. It supports hundreds of models of cell phones and PDAs [5]. Also, there are some ways to retrieve information from some
6 automobiles. For example, some cars store the status of the car several seconds before an impact. This information helped with the conviction of a man for vehicular manslaughter because it showed that he was going 104 miles per hour prior to the collision [2]. However, this information retrieval seems primarily focused on the physical status of the car instead of the electrical system and do not appear to be commercially available. Game Consoles: While game consoles do act like computers, most people may just pass over them when thinking about finding sources of digital evidence. For the most part, these consoles are used purely for gaming purposes. However, there are a few examples to the contrary. One example involves the use of an Xbox console. Some people have found a way to hack Xbox consoles such that they can install Linux onto the hard drive. Thus, the Xbox can be used almost exactly like a computer while still looking like a simple game console. A hacked Xbox can be used to hide important information that one would normally look for on a personal computer. Thus, a digital forensics investigator must know to look for game consoles and other similar devices that may have been modified to hide important information. Another example comes from a rather old game console, the Commodore 64. While this can be used as a personal computer, the Commodore 64 is most known for it being used as a game console. Also, this console was first introduced in 1982 and lost popularity in the early 1990's. So, most people neither have a Commodore 64 nor know how to operate one. This created a significant problem for Austrian police who discovered a Commodore 64 at a crime scene of a kidnapping. The police said that it would be difficult to properly transfer the evidence from the Commodore 64 to an investigation machine to be analyzed [3]. This shows a significant lack in software, procedures, and techniques to retrieve information from non-traditional digital evidence devices.
7 Household Appliances: As mentioned earlier, the use of better technology in household appliances has grown considerably in the last few decades. One example of this can be seen in the development of dish washers. They started out as rather primitive and rarely seen machines. Now they are high-tech and can be seen in almost every modern home. The dish washers have become so advanced that some washers can be connected to a printer or computer to display the status of the dish washer [6]. While these dish washers might not present a great potential for digital evidence, the trend of dish washers and other appliances portends an even greater potential in the very near future. Some people are speculating that household appliances will become so advanced that they will be connected to a network and notify the manufacturer when a part needs to be replaced. Digital forensics investigators must watch these appliances for they may start playing a significant role in digital forensics in the near future. Tools: There appear to be only a few tools with regards to extracting digital evidence from nontraditional equipment. As mentioned above, tools exist that gather information from most, if not all, types of cell phones and other hand held devices. There are also tools that gather some information from automobiles, but these tools do not seem to be publicly available. Beyond these tools, there are hardly any tools or even policies and procedures with regards to extracting data from other non-traditional digital devices. Future Research: Research in the field of extracting and examining digital evidence from non-traditional devices such as automobiles seems to be lacking significantly. Thus, more research must be done in this
8 field. There are two main avenues of research or study. One would be the continual examination of new devices. Digital forensics investigators must know what these new devices are capable of doing and how to extract evidence from these machines. Second, both current and old technologies must be examined more closely. If the Austrian police had more information about the Commodore 64 in a database, they might have been able to better extract and examine the evidence that existed on the console. While it would be unreasonable and unfeasible for digital forensics investigators to be experts on each device capable of providing digital evidence, databases must be built that will store information concerning the procedures necessary to extract information from most devices. Conclusion: While most digital forensics investigations involve only personal computers, the rapid development of other technologies must not go unnoticed by investigators. These non-traditional devices possess the potential contain information that may help solve an investigation. The problem with these devices is that there are too many devices that may contain pertinent information and are so common place that many people will more often than not ignore their potential for providing evidence. Further, very few tools exist that extract information from a small percentage of these digital devices. So, digital forensics investigators must become more of the potential of non-traditional devices and research must be invested in the development of tools and procedures to gather information from these appliances.
9 Bibliography: 1) Ilett, Dan. "Lexus a nexus between cars and phone viruses?". Jan. 27, < >. 2) Koerner, Brendan. "Spy Games". Readers Digest. July < >. 3) Oliver, Mark. "Kidnapper's retro computer offers scant clues". Guardian Unlimited. Sep. 5, < >. 4) "Gone in 20 Minutes: using laptops to steal cars". Leftlane News. < >. 5) "Paraben Forensics Tool". < >. 6) "User's Manual: FlaskScrubber Vantage Series Glassware Washers". < Manual.pdf+washer+manual&hl=en&gl=us&ct=clnk&cd=2&client=firefox-a >.
Digital Cameras. An evaluation of the collection, preservation and evaluation of data collected from digital
Ronald Prine CSC 589 - Digital Forensics New Mexico Institute of Mining and Technology October 17, 2006 Digital Cameras Executive Summary An evaluation of the collection, preservation and evaluation of
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More information5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief
5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren
More informationOne Device to Rule Them All: Controlling Household Devices with a Mobile Phone
One Device to Rule Them All: Controlling Household Devices with a Mobile Phone William Shato Introduction This project was undertaken as part of a seminar course in Mobile Computing. While searching for
More informationRunning Head: IPHONE FORENSICS 1. iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University
Running Head: IPHONE FORENSICS 1 iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University IPHONE FORENSICS 2 Abstract With an ever-growing evolution on technology,
More information2018 Canadian consumer tech market. Executive summary
2018 Canadian consumer tech market Executive summary Overall technology ownership trends The most popular consumer technology products in Canada continue to be televisions, smartphones, and laptops. Among
More information22 nd Century Cell Phone: The Cellular Computer. Kevin Koga, CS 465, , University of Illinois
22 nd Century Cell Phone: The Cellular Computer Kevin Koga, CS 465, 9.24.08, University of Illinois Problems with current cell phones Short battery life Disruption of public spaces Dropped calls / Low
More informationQuick Start Guide. Paraben s SIM Card Seizure. For Authorized Distribution Only. For use with Microsoft Windows XP/Vista/7
For Authorized Distribution Only Quick Start Guide Paraben s SIM Card Seizure For use with Microsoft Windows XP/Vista/7 Paraben s SIM Card Seizure Getting Started Guide Contact Information Product Support
More informationSafety and Security in a Digital Age. South Carolina Bar Convention Family Law Section January 22, 2010
Safety and Security in a Digital Age South Carolina Bar Convention Family Law Section January 22, 2010 Melissa F. Brown Melissa F. Brown, LLC 145 King Street, Suite 405 Charleston, SC 29401 843.722.8900
More informationReport Course name ABSTRACT. Research and reporting. Survey Report. Nguyen Ngoc Long. Ann Viitala. Adesh Chymariya. Shu Sheng 5/2/2010.
Course name Assignment Authors Research and reporting Survey Nguyen Ngoc Long Ann Viitala Adesh Chymariya Shu Sheng Date of the report 5/2/2010 ABSTRACT CONTENTS 1 INTRODUCTION 3 2 THEORETICAL FRAMEWORK,
More informationMetasploit: The Penetration Tester's Guide PDF
Metasploit: The Penetration Tester's Guide PDF "The best guide to the Metasploit Framework."HD Moore, Founder of the Metasploit Project The Metasploit Framework makes discovering, exploiting, and
More informationHow Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.
How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely
More informationEGUIDE - RUNNING ON BORROWED TIME: WHY BUSINESSES MUST FINALLY LET GO OF WINDOWS XP
we ve known it. On this date, Microsoft is set to officially halt all Windows XP support services. A Service Pack 3 (SP3) will be introduced to announce that XP users will no longer receive security updates.
More informationIntroduction CHAPTER1. Strongly Recommend: Guidelines that, if not followed, could result in an unusable application.
sg-midp20.book Page 1 Wednesday, May 14, 2003 1:27 PM CHAPTER1 Introduction MOBILE Information Device Profile (MIDP) defines the Java application environment for mobile information devices (MIDs), such
More informationKaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,
Among the several Internet Security Suites available for the Windows operating system, is Kaspersky Internet Security (KIS). The latest version Kaspersky Internet Security is pretty impressive in terms
More informationTrends in Mobile Forensics from Cellebrite
Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with
More informationWireless Security Algorithms
(NOTE: If you are using a virtual lab to run your attacks you will need an external Wi Fi attachment. The other option is to have a direct install on your computer. Virtual labs cannot access your wireless
More informationSocial Media Reputation Management
Social Media Reputation Management If you are using social media sites such as Facebook or Twitter, there are some simple steps you can take to manage your reputation and protect your identity. Even if
More informationBenefits. Centrally managed protection of corporate networks
Defend what you create Centrally managed protection of corporate networks Benefits Centrally managed protection of Windows workstations, Windows file servers and Unix mail servers High scalability Grouping
More informationDisclaimer Reasonable care has been taken to ensure that the information presented in this book is accurate. However, the reader should understand
Disclaimer Reasonable care has been taken to ensure that the information presented in this book is accurate. However, the reader should understand that the information provided does not constitute legal
More informationSecuring Your Campus
Securing Your Campus Copyright CheckVideo LLC. All Rights Reserved. Introduction Security and Safety Officers are committed to providing a safe and welcoming learning environment that prepares students
More informationHow To Remove Personal Antivirus Security Pro Virus
How To Remove Personal Antivirus Security Pro Virus When hackers break into government servers to steal your personal data, there's not a The independent labs uniformly heap praise on Kaspersky Anti-Virus
More informationConsumer Insights. YouGov Omnibus, 5 th -6 th April
Consumer Insights YouGov Omnibus, 5 th -6 th April 2018 research@iabuk.net Methodology asked a series of questions to consumers to support the release of the Full Year 2017 Adspend Report Quantitative
More informationMobile Experience and Security - A Delicate Balance. Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence
Mobile Experience and Security - A Delicate Balance Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence Admin Items Please put phones on vibrate Please take calls
More informationPolice Technical Approach to Cyber Threats
Police Technical Approach to Cyber Threats Jumpei Kawahara Director of High-Tech Crime Technology Division, National Police Agency, Japan 1 Overview (cases) Current Situation 140000 140,000 120000 100000
More informationSetting Your Site Preferences
Setting Your Site Preferences Created on October 1, 2016 This Page Intentionally Left Blank Setting Your Preferences ii 02-Jan-17 ii Table of Contents Introduction... 4 Opening the Setting or Preferences
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationEliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat
WHITE PAPER Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat Executive Summary Unfortunately, it s a foregone conclusion that no organisation is 100 percent safe
More informationInternet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came
Victoria Ellsworth Dr. Ping Li ICTN 4040 04/11/17 Internet of Things (IoT) Attacks The Internet of Things (IoT) is based off a larger concept; the Internet of Things came from idea of the Internet of Everything.
More informationPRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement
CHESTER COUNTY DISTRICT ATTORNEY S OFFICE TELEPHONE: 610-344-6801 FAX: 610-344-5905 THOMAS P. HOGAN DISTRICT ATTORNEY 201 W. MARKET STREET, SUITE 4450 POST OFFICE BOX 2748 WEST CHESTER, PA 19380-0991 March
More informationDigital Forensic Science: Ideas, Gaps and the Future. Dr. Joshua I. James
Digital Forensic Science: Ideas, Gaps and the Future Dr. Joshua I. James Joshua@cybercrimetech.com 2015-08-09 Overview Digital Forensic Science where are we now? Past Present Where are we going? Future
More informationConsumer Virtualization: Virtual Computers for Everyone
A VMLite.com White Paper VMLite Inc. http://www.vmlite.com/ Consumer Virtualization: Virtual Computers for Everyone October 22, 2009 Introduction While a lot of us know that the most successful technology
More informationITONLINEEXAM.COM. Chapter 1 Basic Introduction to Computers
ITONLINEEXAM.COM Chapter 1 Basic Introduction to Computers A World of Computers Computers are everywhere 2 What Is a Computer? A computer is an electronic device, operating under the control of instructions
More informationACN Premium Technical Support. 24/7/365 Remote Computer Support
ACN Premium Technical Support 24/7/365 Remote Computer Support What is ACN Premium Technical Support? Premier provider of technical assistance for your computer and electronic devices 24/7/365 remote on-demand
More informationcamcorders as a social research method
Real Life Methods Part of the ESRC National Centre for Research Methods Toolkit #04 Participant Produced Video: Giving participants camcorders as a social research method Stewart Muir, Real Life Methods,
More informationContents. Slide Set 1. About these slides. Outline of Slide Set 1. Typographical conventions: Italics. Typographical conventions. About these slides
Slide Set 1 for ENCM 369 Winter 2014 Lecture Section 01 Steve Norman, PhD, PEng Electrical & Computer Engineering Schulich School of Engineering University of Calgary Winter Term, 2014 ENCM 369 W14 Section
More informationEthical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Chapter 7 Hacking Mobile Phones, PDAs, and Handheld Devices Objectives After completing this chapter,
More informationForensic Analysis of ios Device Backups
Forensic Analysis of ios Device Backups ios Apple s mobile operating system Originally known as iphone OS Unveiled in 2007 Current version is 8.3, released April 8, 2015 ios Runs on: iphone ipod Touch
More informationSecurity of Wireless Networks in Intelligent Vehicle Systems
Security of Wireless Networks in Intelligent Vehicle Systems Syed M. Mahmud and Shobhit Shanker Electrical and Computer Engg. Dept. Wayne State University Detroit, MI 48202 Email: smahmud@eng.wayne.edu
More informationDefine the term, computer, and describe the relationship between data and information
Discovering Computers 2010 Living in a Digital World Objectives Overview Explain why computer literacy is vital to success in today s world Define the term, computer, and describe the relationship between
More informationThe Data Breach: How to Stay Defensible Before, During & After the Incident
The Data Breach: How to Stay Defensible Before, During & After the Incident Alex Ricardo Beazley Insurance Breach Response Services Lynn Sessions Baker Hostetler Partner Michael Bazzell Computer Security
More informationQuestion: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break.
1 ISC - SSCP System Security Certified Practitioner (SSCP) Question: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break. Question: 2 What is the main difference between computer
More informationFoothill-De Anza Community College District Wireless Networking Guidelines. Problems Connecting to or Using the Wireless Network
Foothill-De Anza Community College District Wireless Networking Guidelines Problems Connecting to or Using the Wireless Network My login name and password are not working. HELP! There are different wireless
More informationThe Scenes of Cyber Crime
Organizer: BRIDGING BARRIERS: LEGAL AND TECHNICAL OF CYBERCRIME CASES The Scenes of Cyber Crime 5 July 2011 Toralv Dirro EMEA Security Strategist, McAfee Labs Low Risk + High Profit -> Crime 500,000 Cyber
More informationUSER GUIDE KASPERSKY MOBILE SECURITY 8.0
USER GUIDE KASPERSKY MOBILE SECURITY 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.
More informationHacking Demonstration. Dr John McCarthy Ph.D. BSc (Hons) MBCS
Hacking Demonstration Dr John McCarthy Ph.D. BSc (Hons) MBCS Demonstration Deploying effective cyber security is one of the 21 st century s greatest challenges for business. The threats facing businesses
More informationLOCATION DATA. Location information from mobile devices is typically obtained using the following:
LOCATION DATA Location information from mobile devices is typically obtained using the following: 1. Cell PING (Triangulation) 2. Stingray device 3. Wi-Fi, Bluetooth tracking 4. Apps and Web browsing 5.
More informationA practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
More informatione-pg Pathshala Subject : Computer Science Paper: Embedded System Module: Microcontrollers and Embedded Processors Module No: CS/ES/2 Quadrant 1 e-text
e-pg Pathshala Subject : Computer Science Paper: Embedded System Module: Microcontrollers and Embedded Processors Module No: CS/ES/2 Quadrant 1 e-text In this module, microcontrollers and embedded processors
More informationVerified by VINtrack
Verified by VINtrack VINtrack Software is the only VIN barcode software in the world that catches counterfeits and clones with its unique database. Just ONE stolen vehicle recovery will pay for the unit
More informationUnderstanding Managed Services
Understanding Managed Services The buzzword relating to IT Support is Managed Services, and every day more and more businesses are jumping on the bandwagon. But what does managed services actually mean
More informationGlobal Mobile Consumer Survey, US Edition Overview of results
Global Mobile Consumer Survey, US Edition Overview of results Smartphones front and center Mobile phones are still on the rise, in number and importance Smartphone ownership reached 85% (a YoY increase
More informationM.A.M System. Final Report. Apper: Jingdong Su Programmer: Jianwei Xu and Yunan Zhao. Wordcount: Mobile Aided Manufacturing
M.A.M System Mobile Aided Manufacturing Final Report Wordcount:1660+300 Apper: Jingdong Su Programmer: Jianwei Xu and Yunan Zhao 1.Introduction Our Application is aim to help the user to have a better
More informationSecurity Vulnerabilities of Apple iphone Fingerprint Authentication. Suruchi Devanahalli
1 Security Vulnerabilities of Apple iphone Fingerprint Authentication Suruchi Devanahalli 2 Contents 1. Abstract 2. Introduction 2.1 The Touch ID sensor and the Secure Enclave 2.2 Fingerprint scan analysis
More informationUnderstanding Internet Speed Test Results
Understanding Internet Speed Test Results Why Do Some Speed Test Results Not Match My Experience? You only have to read the popular press to know that the Internet is a very crowded place to work or play.
More informationSOLUTION BRIEF. Video Changes the Future of Policing
SOLUTION BRIEF Video Changes the Future of Policing Abstract Public safety organizations continuously look for new tools to help them better serve and protect the citizens of the community as well as to
More informationProtect Yourself From. Identify Theft
Protect Yourself From Identify Theft What is Identity Theft? Identity theft occurs when someone uses another person identifying information without their permission in order to access resources, obtain
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is
More informationThe State of the American Traveler TM
The State of the American Traveler TM MOBILE EDITION Fall 2018 Volume 30 The Mobile Edition THIS FALL EDITION of The State of the American Traveler TM continues our ongoing exploration of travelers use
More informationIPLocks Vulnerability Assessment: A Database Assessment Solution
IPLOCKS WHITE PAPER September 2005 IPLocks Vulnerability Assessment: A Database Assessment Solution 2665 North First Street, Suite 110 San Jose, CA 95134 Telephone: 408.383.7500 www.iplocks.com TABLE OF
More informationDigital Forensics at a University. Calvin Weeks Director, Oklahoma Digital Forensics Lab University of Oklahoma
Digital Forensics at a University Calvin Weeks Director, University of Oklahoma Calvin Weeks Director, Former Director of IT Security Certified EnCASE Examiner (EnCE) VP of the local chapter of HTCIA Co-Chair
More information1-7 Attacks on Cryptosystems
1-7 Attacks on Cryptosystems In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from
More informationWelcome to Windows 10. Love it or Avoid it
1 Welcome to Windows 10 Love it or Avoid it 2 What is an OPERATING SYSTEM??? 1) It s a set of programs that control the computer and make the components work together 2) It provides a interface between
More informationIT & DATA SECURITY BREACH PREVENTION
IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part 1: Reducing Employee and Application Risks CONTENTS EMPLOYEES: IT security hygiene best practice APPLICATIONS: Make patching a priority AS CORPORATE
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationMilitary Forensics COLLECT, EXPLOIT, AND REACT IN THE FIELD
Military Forensics COLLECT, EXPLOIT, AND REACT IN THE FIELD Military Forensics : COLLECT, EXPLOIT, AND REACT IN THE FIELD 2 Collect, Exploit, and React in the Field Timely access to battlefield intelligence
More informationChapter 1- The Blender Interface
Chapter 1- The Blender Interface The Blender Screen Years ago, when I first looked at Blender and read some tutorials I thought that this looked easy and made sense. After taking the program for a test
More informationStandards for Test Automation
Standards for Test Automation Brian Tervo Windows XP Automation Applications Compatibility Test Lead Microsoft Corporation Overview Over the last five years, I ve had the opportunity to work in a group
More informationMODULE No. 33: Digital Crime Scene Investigation
SUBJECT Paper No. and Title Module No. and Title Module Tag FSC_P16_M33 TABLE OF CONTENTS 1. Learning Outcomes 2. Introduction 3. Digital Crime Scene Investigation. 3.1 What Is Digital Evidence? 3.2 Working
More informationChildren, Mobile Phones and the Internet
Children, Mobile Phones and the Internet Experts Meeting Mitsubishi Research Institute Tokyo, March, 2003 The largest independent provider of services to families and children in the UK 5000 full-time
More informationCopyright 2016
This video will look at some naming convention that can be used on networks for computers, e-mail and file shares. There are many different naming conventions used in the world and these are just some
More informationNCMail: Microsoft Outlook User s Guide
NCMail: Microsoft Outlook 2003 Email User s Guide Revision 1.0 11/10/2007 This document covers how to use Microsoft Outlook 2003 for accessing your email with the NCMail Exchange email system. The syntax
More information24/7 Instant Technical Support Designed for Non-Geeks
Fast & Flawless: iprotector 24/7 Instant Technical Support Designed for Non-Geeks RESCUECOM s ground breaking, revolutionary software and flawless service means you get the support you need, the moment
More informationThe Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1
The Cyber Threat Bob Gourley, Partner, Cognitio June 22, 2016 How we think. 1 About This Presentation Based on decades of experience in cyber conflict Including cyber defense, cyber intelligence, cyber
More informationLearning Objectives: Topic Karnaugh Maps. At the end of this topic you will be able to;
Topic.2.3 Karnaugh Maps Learning Objectives: t the end of this topic you will be able to; Draw a Karnaugh map for a logic system with up to four inputs and use it to minimise the number of gates required;
More informationMOVE IN INFORMATION Strong's Student Rentals KEEP Kimmel Rd. Home, PA Office:
MOVE IN INFORMATION Strong's Student Rentals KEEP 13-14 442 Kimmel Rd. Home, PA 15747 Office: 724-463-7222 Tenants, Hello and welcome to Strong s Student Rentals. This packet contains important information,
More informationINTERNET SAFETY IS IMPORTANT
INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being
More informationWhen Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.
When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the
More informationBOSCH CASE STUDY. How Bosch Has Benefited from GENIVI Adoption
February 2016 BOSCH CASE STUDY How Bosch Has Benefited from GENIVI Adoption Overview The GENIVI Alliance was launched with a mission of driving the broad adoption of open source, In-Vehicle Infotainment
More informationManually Sync Ipod Touch Music To Pc Transfer 2012
Manually Sync Ipod Touch Music To Pc Transfer 2012 I want to transfer my music on my Ipod nano, which is synced to the old MacBook, to my new For ipod touch sync with itunes, please follow these steps:
More informationOffice 365 Portal, OneDrive, & Delve
Office 365 Portal, OneDrive, & Delve Training Packet Welcome to Technology Solution s Office 365, OneDrive, and Delve training! We will use this packet as a guide throughout today s training. We ll introduce
More informationTOP 10 Vulnerability Trends for By Nevis Labs
TOP Vulnerability Trends for 28 By Nevis Labs Date: December 11, 27 Page 1 It s the last month of 27 and the time is right to look back at the year and predict the vulnerability trends for 28. A quick
More informationSyllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview
Syllabus Course Title: Cyber Course Number: CIT 435 Course Description: Introduces the principles and practices of digital forensics including digital investigations, data and file recovery methods, and
More informationA Criminal Intrudes into a Bank in Geneva Korean agents. Canadian agents make the arrest. Argentinian investigators. discover. attack came from Seoul
Harmonizing National Legal Approaches and International Legal Coordination International Cooperation in Cybercrime Investigations A Law Enforcement Perspective Colonel Claudio Peguero ITU / WSIS Thematic
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of
More informationMobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter
Mobile Devices Presenter Don Mason Associate Director, NCJRL 662-915-6898 drmason@olemiss.edu Questions Feel free to email any time to: drmason@olemiss.edu Please include your phone number In case it might
More informationYour web browser (Safari 7) is out of date. For more security, comfort and the best experience on this site: Update your browser Ignore
Your web browser (Safari 7) is out of date. For more security, comfort and the best experience on this site: Update your browser Ignore SPREADING THE MESS AGE FrontlineSMS uses mobile technology to help
More informationSAFE Home Inventory. Getting Started Guide
SAFE Home Inventory Getting Started Guide Table of Contents What can I do with SAFE?... 1 Getting started using SAFE... 1 Overview of SAFE screens... 1 Use the collectibles and household items screens...
More informationYou Could Kill Someone and Go to Jail for Talking or Texting While Driving California Vehicle Code Sections 23123, 23124
You Could Kill Someone and Go to Jail for Talking or Texting While Driving California Vehicle Code Sections 23123, 23124 You Could Kill Someone and Go to Jail for Talking or Texting While Driving California
More informationWhite Paper Digital Evidence Preservation and Distribution: Updating the Analog System for the Digital World July 2011
White Paper Digital Evidence Preservation and Distribution: Updating the Analog System for the Digital World July 2011 I. Introduction A majority of crimes committed today have a digital component, and
More information1.264 Lecture 26. Security protocols. Next class: Anderson chapter 4. Exercise due before class
1.264 Lecture 26 Security protocols Next class: Anderson chapter 4. Exercise due before class 1 Encryption Encryption is the process of: Transforming information (referred to as plaintext) Using an algorithm
More informationStudent Name. WTL Research Paper Portable Computer Proposal. June 26, Mrs. Rinaldi
Student Name WTL Research Paper Portable Computer Proposal June 26, 2011 Mrs. Rinaldi The great thing in the world is not so much where we stand, as in what direction we are moving. -Oliver Wendell Holmes
More informationIphone virus protection
Iphone virus protection Search Protect your devices with the best free antivirus on the market. Download Avast antivirus and anti-spyware protection for your PC, Mac and Android. Securely surf on your
More informationBETTER TIPS FOR TAPS LIBRARY TECHNOLOGY CONFERENCE 2017 JUNIOR TIDAL WEB SERVICES & MULTIMEDIA LIBRARIAN NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY
BETTER TIPS FOR TAPS LIBRARY TECHNOLOGY CONFERENCE 2017 JUNIOR TIDAL WEB SERVICES & MULTIMEDIA LIBRARIAN NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY OVERVIEW MOBILE USABILITY TESTING MOBILE VS DESKTOP SETTING
More informationOverview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks
Overview Handling Security Incidents Chapter 7 Lecturer: Pei-yih Ting Attacks Security Incidents Handling Security Incidents Incident management Methods and Tools Maintaining Incident Preparedness Standard
More informationBeyond the F.U.D. How to start securing your DCS network today.
Beyond the F.U.D. (Fear, Uncertainty, and Doubt) Process Systems How to start securing your DCS network today. Securing Your Process Control Network You work in the Process Control industry, so I m sure
More informationBackground on North Buckhead s Security Camera Planning
Background on North Buckhead s Security Camera Planning By Gordon Certain NBCA President February,24, 2018 Compared to much of 2016, crime in residential parts of North Buckhead is down. That s the good
More informationTechnology Safety Quick Tips
Technology Safety Quick Tips Spyware: Computer & Phone Monitoring Software It enables a person to secretly monitor someone else s entire computer activity. It can be installed remotely by sending an email,
More informationCyber and data security How prepared is your charity?
Cyber and data security How prepared is your charity? 1 Executive summary In this report we reveal the results of our survey 54% of respondents didn t know or said their charity was not well equipped to
More informationAll Voice over IP Explanations V0.2
V0.2 May 2017 Page 1 of 7 Contents 1 All IP Transformation... 3 1.1. Why All IP... 3 1.1.1 Many important benefits... 3 1.1.2 Flexible... 3 1.1.3 Simple... 3 1.1.4 Efficient... 3 1.2. Managing the transformation...
More information