Investigation of Non-traditional Equipment: Autos, Washers,

Size: px
Start display at page:

Download "Investigation of Non-traditional Equipment: Autos, Washers,"

Transcription

1 Investigation of Non-traditional Equipment: Autos, Washers, By: Ryan Ware Digital Forensics October 17, 2006

2 Executive Summary: Traditional digital forensics investigations usually involve the retrieval and examination of information from personal computers, mass storage devices such as tape drives and USB drives, and network related devices. So, most investigators will encounter cases in which information most relevant information is provided by those traditional devices. However, cases do arise and will arise in which traditional equipment does not provide sufficient evidence. Thus, the investigator may need to search for non-traditional sources of digital evidence. However, there are many potential sources most of which would not normally be thought of as an actual source of information. Also, for many of these devices, there do not exist any tools, policies, or procedures that will aide with the extraction of useful evidence from the devices. Research and work must be done to provide tools and policies for the extraction of digital evidence from nontraditional equipment.

3 Digital Forensics Problem: With the development of new and improved technology these days, the of use electronic equipment continues to grow. As everyone knows, personal computers are becoming better and better allowing criminals to use them with greater success in their illegal actions. These developments cause a significant problem for digital forensics investigators who not only have to keep up-to-date with new technology but must also become very familiar with both new and old forensics techniques. To complicate things further, personal computers are not the only source of digital evidence. In fact, there are so many potential sources that most people, even digital forensics investigators, do not often think of these non-traditional electronic equipment as sources of evidence. Since these sources often go unnoticed, some useful evidence may be missed entirely. Sources of Non-Traditional Forensics Evidence: Embedded systems probably present the widest variety of potential digital evidence. These embedded systems may be found almost anywhere. The most visible and well-known form of embedded systems are cell phones and hand-held devices such as PDAs. However, there are many more sources of digital evidence. Some other known sources include: printers, fax machines, copiers, scanners, and cameras. There are even more devices that people do not often think of as evidence providers. These machines may include: digital watches, global positioning systems (GPS), VCRs, answering machines, game consoles, automobiles, and common household appliances such as dish washers. Thankfully, most people, even criminals, do not often use these non-traditional storage devices to store information other than what was intended to be stored on those devices. So, this means that

4 most investigators will only deal with traditional devices such as personal computers. Unfortunately, this means that, when faced with some non-traditional devices as potential evidence, most digital forensics investigators will either be unable to properly extract the important information or not even consider the device as an important source of information. Also, this means that very few tools, policies, and procedures have been developed to extract information from these non-traditional sources of evidence. While these non-traditional devices do not always provide useful digital evidence, they must not be overlooked. These devices may provide important evidence that can make or break a case that did not have sufficient evidence based on evidence gather via traditional means. The information provided by these devices may often be untouched by the criminal because many people often overlook these devices. They may provide a time line, phone numbers, calendars, appointments, contact information, voice recordings, or even visual recordings. Most of these non-conventional sources of evidence will even store information about someone or something without that person's knowledge. Since these machines may provide useful information, investigators must keep these appliances in mind and understand most of their capabilities and the information that may be stored on them. Recently, several non-traditional devices have gained publicity on their potential for either criminal purposes or source of digital evidence for investigators. Some computer systems on newer automobiles have shown some significant potential for criminal exploitation. Game consoles have also been used to store some important information, and new appliances such as dish washers may possess some potential for exploitation.

5 Automobiles: Recently, more automobiles have been created with two rather interesting features. One feature involves the use of bluetooth devices to allow cell phones and other devices with bluetooth capabilities to interact with the car. The second feature is a marked increase in electronic equipment and software to allow for easier use of the car. Both of these increase the customer's comfort. However, they also increase potential for exploitation by a not so welcome person. The increased use of software and electronic equipment in newer cars has provided extra comfort and, to some degree, extra security. However, increased complexity within a system allows for more potential exploits. For example, the increased use of software and bluetooth devices makes some new cars vulnerable to viruses. According to Kaspersky Labs, a Russian anti-virus firm, Lexus vehicles and possibly other vehicles have the potential to be infected by viruses. These viruses may be introduced by infected cell phones on cars with operating systems similar to cell phone operating systems. The viruses may affect the navigation systems, security systems, or other electronic systems within a car [1]. Further, some automobiles with keyless entry and keyless ignition have been broken into wirelessly. Apparently, the security in these systems are not very strong due to the fact that they use embedded systems and, therefore, do not have the capability to utilize some of the stronger encryption algorithms and other security features [4]. If any of these automobile features were exploited in a crime, a digital forensics investigator must be able to retrieve any relevant information from any technology involved. There are currently several tools that can retrieve information from cell phones. One such tool is called Paraben's Device Seizure and is produced by Paraben Corporation. It supports hundreds of models of cell phones and PDAs [5]. Also, there are some ways to retrieve information from some

6 automobiles. For example, some cars store the status of the car several seconds before an impact. This information helped with the conviction of a man for vehicular manslaughter because it showed that he was going 104 miles per hour prior to the collision [2]. However, this information retrieval seems primarily focused on the physical status of the car instead of the electrical system and do not appear to be commercially available. Game Consoles: While game consoles do act like computers, most people may just pass over them when thinking about finding sources of digital evidence. For the most part, these consoles are used purely for gaming purposes. However, there are a few examples to the contrary. One example involves the use of an Xbox console. Some people have found a way to hack Xbox consoles such that they can install Linux onto the hard drive. Thus, the Xbox can be used almost exactly like a computer while still looking like a simple game console. A hacked Xbox can be used to hide important information that one would normally look for on a personal computer. Thus, a digital forensics investigator must know to look for game consoles and other similar devices that may have been modified to hide important information. Another example comes from a rather old game console, the Commodore 64. While this can be used as a personal computer, the Commodore 64 is most known for it being used as a game console. Also, this console was first introduced in 1982 and lost popularity in the early 1990's. So, most people neither have a Commodore 64 nor know how to operate one. This created a significant problem for Austrian police who discovered a Commodore 64 at a crime scene of a kidnapping. The police said that it would be difficult to properly transfer the evidence from the Commodore 64 to an investigation machine to be analyzed [3]. This shows a significant lack in software, procedures, and techniques to retrieve information from non-traditional digital evidence devices.

7 Household Appliances: As mentioned earlier, the use of better technology in household appliances has grown considerably in the last few decades. One example of this can be seen in the development of dish washers. They started out as rather primitive and rarely seen machines. Now they are high-tech and can be seen in almost every modern home. The dish washers have become so advanced that some washers can be connected to a printer or computer to display the status of the dish washer [6]. While these dish washers might not present a great potential for digital evidence, the trend of dish washers and other appliances portends an even greater potential in the very near future. Some people are speculating that household appliances will become so advanced that they will be connected to a network and notify the manufacturer when a part needs to be replaced. Digital forensics investigators must watch these appliances for they may start playing a significant role in digital forensics in the near future. Tools: There appear to be only a few tools with regards to extracting digital evidence from nontraditional equipment. As mentioned above, tools exist that gather information from most, if not all, types of cell phones and other hand held devices. There are also tools that gather some information from automobiles, but these tools do not seem to be publicly available. Beyond these tools, there are hardly any tools or even policies and procedures with regards to extracting data from other non-traditional digital devices. Future Research: Research in the field of extracting and examining digital evidence from non-traditional devices such as automobiles seems to be lacking significantly. Thus, more research must be done in this

8 field. There are two main avenues of research or study. One would be the continual examination of new devices. Digital forensics investigators must know what these new devices are capable of doing and how to extract evidence from these machines. Second, both current and old technologies must be examined more closely. If the Austrian police had more information about the Commodore 64 in a database, they might have been able to better extract and examine the evidence that existed on the console. While it would be unreasonable and unfeasible for digital forensics investigators to be experts on each device capable of providing digital evidence, databases must be built that will store information concerning the procedures necessary to extract information from most devices. Conclusion: While most digital forensics investigations involve only personal computers, the rapid development of other technologies must not go unnoticed by investigators. These non-traditional devices possess the potential contain information that may help solve an investigation. The problem with these devices is that there are too many devices that may contain pertinent information and are so common place that many people will more often than not ignore their potential for providing evidence. Further, very few tools exist that extract information from a small percentage of these digital devices. So, digital forensics investigators must become more of the potential of non-traditional devices and research must be invested in the development of tools and procedures to gather information from these appliances.

9 Bibliography: 1) Ilett, Dan. "Lexus a nexus between cars and phone viruses?". Jan. 27, < >. 2) Koerner, Brendan. "Spy Games". Readers Digest. July < >. 3) Oliver, Mark. "Kidnapper's retro computer offers scant clues". Guardian Unlimited. Sep. 5, < >. 4) "Gone in 20 Minutes: using laptops to steal cars". Leftlane News. < >. 5) "Paraben Forensics Tool". < >. 6) "User's Manual: FlaskScrubber Vantage Series Glassware Washers". < Manual.pdf+washer+manual&hl=en&gl=us&ct=clnk&cd=2&client=firefox-a >.

Digital Cameras. An evaluation of the collection, preservation and evaluation of data collected from digital

Digital Cameras. An evaluation of the collection, preservation and evaluation of data collected from digital Ronald Prine CSC 589 - Digital Forensics New Mexico Institute of Mining and Technology October 17, 2006 Digital Cameras Executive Summary An evaluation of the collection, preservation and evaluation of

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief 5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren

More information

One Device to Rule Them All: Controlling Household Devices with a Mobile Phone

One Device to Rule Them All: Controlling Household Devices with a Mobile Phone One Device to Rule Them All: Controlling Household Devices with a Mobile Phone William Shato Introduction This project was undertaken as part of a seminar course in Mobile Computing. While searching for

More information

Running Head: IPHONE FORENSICS 1. iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University

Running Head: IPHONE FORENSICS 1. iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University Running Head: IPHONE FORENSICS 1 iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University IPHONE FORENSICS 2 Abstract With an ever-growing evolution on technology,

More information

2018 Canadian consumer tech market. Executive summary

2018 Canadian consumer tech market. Executive summary 2018 Canadian consumer tech market Executive summary Overall technology ownership trends The most popular consumer technology products in Canada continue to be televisions, smartphones, and laptops. Among

More information

22 nd Century Cell Phone: The Cellular Computer. Kevin Koga, CS 465, , University of Illinois

22 nd Century Cell Phone: The Cellular Computer. Kevin Koga, CS 465, , University of Illinois 22 nd Century Cell Phone: The Cellular Computer Kevin Koga, CS 465, 9.24.08, University of Illinois Problems with current cell phones Short battery life Disruption of public spaces Dropped calls / Low

More information

Quick Start Guide. Paraben s SIM Card Seizure. For Authorized Distribution Only. For use with Microsoft Windows XP/Vista/7

Quick Start Guide. Paraben s SIM Card Seizure. For Authorized Distribution Only. For use with Microsoft Windows XP/Vista/7 For Authorized Distribution Only Quick Start Guide Paraben s SIM Card Seizure For use with Microsoft Windows XP/Vista/7 Paraben s SIM Card Seizure Getting Started Guide Contact Information Product Support

More information

Safety and Security in a Digital Age. South Carolina Bar Convention Family Law Section January 22, 2010

Safety and Security in a Digital Age. South Carolina Bar Convention Family Law Section January 22, 2010 Safety and Security in a Digital Age South Carolina Bar Convention Family Law Section January 22, 2010 Melissa F. Brown Melissa F. Brown, LLC 145 King Street, Suite 405 Charleston, SC 29401 843.722.8900

More information

Report Course name ABSTRACT. Research and reporting. Survey Report. Nguyen Ngoc Long. Ann Viitala. Adesh Chymariya. Shu Sheng 5/2/2010.

Report Course name ABSTRACT. Research and reporting. Survey Report. Nguyen Ngoc Long. Ann Viitala. Adesh Chymariya. Shu Sheng 5/2/2010. Course name Assignment Authors Research and reporting Survey Nguyen Ngoc Long Ann Viitala Adesh Chymariya Shu Sheng Date of the report 5/2/2010 ABSTRACT CONTENTS 1 INTRODUCTION 3 2 THEORETICAL FRAMEWORK,

More information

Metasploit: The Penetration Tester's Guide PDF

Metasploit: The Penetration Tester's Guide PDF Metasploit: The Penetration Tester's Guide PDF "The best guide to the Metasploit Framework."—HD Moore, Founder of the Metasploit Project The Metasploit Framework makes discovering, exploiting, and

More information

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely

More information

EGUIDE - RUNNING ON BORROWED TIME: WHY BUSINESSES MUST FINALLY LET GO OF WINDOWS XP

EGUIDE - RUNNING ON BORROWED TIME: WHY BUSINESSES MUST FINALLY LET GO OF WINDOWS XP we ve known it. On this date, Microsoft is set to officially halt all Windows XP support services. A Service Pack 3 (SP3) will be introduced to announce that XP users will no longer receive security updates.

More information

Introduction CHAPTER1. Strongly Recommend: Guidelines that, if not followed, could result in an unusable application.

Introduction CHAPTER1. Strongly Recommend: Guidelines that, if not followed, could result in an unusable application. sg-midp20.book Page 1 Wednesday, May 14, 2003 1:27 PM CHAPTER1 Introduction MOBILE Information Device Profile (MIDP) defines the Java application environment for mobile information devices (MIDs), such

More information

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall, Among the several Internet Security Suites available for the Windows operating system, is Kaspersky Internet Security (KIS). The latest version Kaspersky Internet Security is pretty impressive in terms

More information

Trends in Mobile Forensics from Cellebrite

Trends in Mobile Forensics from Cellebrite Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with

More information

Wireless Security Algorithms

Wireless Security Algorithms (NOTE: If you are using a virtual lab to run your attacks you will need an external Wi Fi attachment. The other option is to have a direct install on your computer. Virtual labs cannot access your wireless

More information

Social Media Reputation Management

Social Media Reputation Management Social Media Reputation Management If you are using social media sites such as Facebook or Twitter, there are some simple steps you can take to manage your reputation and protect your identity. Even if

More information

Benefits. Centrally managed protection of corporate networks

Benefits. Centrally managed protection of corporate networks Defend what you create Centrally managed protection of corporate networks Benefits Centrally managed protection of Windows workstations, Windows file servers and Unix mail servers High scalability Grouping

More information

Disclaimer Reasonable care has been taken to ensure that the information presented in this book is accurate. However, the reader should understand

Disclaimer Reasonable care has been taken to ensure that the information presented in this book is accurate. However, the reader should understand Disclaimer Reasonable care has been taken to ensure that the information presented in this book is accurate. However, the reader should understand that the information provided does not constitute legal

More information

Securing Your Campus

Securing Your Campus Securing Your Campus Copyright CheckVideo LLC. All Rights Reserved. Introduction Security and Safety Officers are committed to providing a safe and welcoming learning environment that prepares students

More information

How To Remove Personal Antivirus Security Pro Virus

How To Remove Personal Antivirus Security Pro Virus How To Remove Personal Antivirus Security Pro Virus When hackers break into government servers to steal your personal data, there's not a The independent labs uniformly heap praise on Kaspersky Anti-Virus

More information

Consumer Insights. YouGov Omnibus, 5 th -6 th April

Consumer Insights. YouGov Omnibus, 5 th -6 th April Consumer Insights YouGov Omnibus, 5 th -6 th April 2018 research@iabuk.net Methodology asked a series of questions to consumers to support the release of the Full Year 2017 Adspend Report Quantitative

More information

Mobile Experience and Security - A Delicate Balance. Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence

Mobile Experience and Security - A Delicate Balance. Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence Mobile Experience and Security - A Delicate Balance Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence Admin Items Please put phones on vibrate Please take calls

More information

Police Technical Approach to Cyber Threats

Police Technical Approach to Cyber Threats Police Technical Approach to Cyber Threats Jumpei Kawahara Director of High-Tech Crime Technology Division, National Police Agency, Japan 1 Overview (cases) Current Situation 140000 140,000 120000 100000

More information

Setting Your Site Preferences

Setting Your Site Preferences Setting Your Site Preferences Created on October 1, 2016 This Page Intentionally Left Blank Setting Your Preferences ii 02-Jan-17 ii Table of Contents Introduction... 4 Opening the Setting or Preferences

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat WHITE PAPER Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat Executive Summary Unfortunately, it s a foregone conclusion that no organisation is 100 percent safe

More information

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came

Internet of Things (IoT) Attacks. The Internet of Things (IoT) is based off a larger concept; the Internet of Things came Victoria Ellsworth Dr. Ping Li ICTN 4040 04/11/17 Internet of Things (IoT) Attacks The Internet of Things (IoT) is based off a larger concept; the Internet of Things came from idea of the Internet of Everything.

More information

PRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement

PRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement CHESTER COUNTY DISTRICT ATTORNEY S OFFICE TELEPHONE: 610-344-6801 FAX: 610-344-5905 THOMAS P. HOGAN DISTRICT ATTORNEY 201 W. MARKET STREET, SUITE 4450 POST OFFICE BOX 2748 WEST CHESTER, PA 19380-0991 March

More information

Digital Forensic Science: Ideas, Gaps and the Future. Dr. Joshua I. James

Digital Forensic Science: Ideas, Gaps and the Future. Dr. Joshua I. James Digital Forensic Science: Ideas, Gaps and the Future Dr. Joshua I. James Joshua@cybercrimetech.com 2015-08-09 Overview Digital Forensic Science where are we now? Past Present Where are we going? Future

More information

Consumer Virtualization: Virtual Computers for Everyone

Consumer Virtualization: Virtual Computers for Everyone A VMLite.com White Paper VMLite Inc. http://www.vmlite.com/ Consumer Virtualization: Virtual Computers for Everyone October 22, 2009 Introduction While a lot of us know that the most successful technology

More information

ITONLINEEXAM.COM. Chapter 1 Basic Introduction to Computers

ITONLINEEXAM.COM. Chapter 1 Basic Introduction to Computers ITONLINEEXAM.COM Chapter 1 Basic Introduction to Computers A World of Computers Computers are everywhere 2 What Is a Computer? A computer is an electronic device, operating under the control of instructions

More information

ACN Premium Technical Support. 24/7/365 Remote Computer Support

ACN Premium Technical Support. 24/7/365 Remote Computer Support ACN Premium Technical Support 24/7/365 Remote Computer Support What is ACN Premium Technical Support? Premier provider of technical assistance for your computer and electronic devices 24/7/365 remote on-demand

More information

camcorders as a social research method

camcorders as a social research method Real Life Methods Part of the ESRC National Centre for Research Methods Toolkit #04 Participant Produced Video: Giving participants camcorders as a social research method Stewart Muir, Real Life Methods,

More information

Contents. Slide Set 1. About these slides. Outline of Slide Set 1. Typographical conventions: Italics. Typographical conventions. About these slides

Contents. Slide Set 1. About these slides. Outline of Slide Set 1. Typographical conventions: Italics. Typographical conventions. About these slides Slide Set 1 for ENCM 369 Winter 2014 Lecture Section 01 Steve Norman, PhD, PEng Electrical & Computer Engineering Schulich School of Engineering University of Calgary Winter Term, 2014 ENCM 369 W14 Section

More information

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Chapter 7 Hacking Mobile Phones, PDAs, and Handheld Devices Objectives After completing this chapter,

More information

Forensic Analysis of ios Device Backups

Forensic Analysis of ios Device Backups Forensic Analysis of ios Device Backups ios Apple s mobile operating system Originally known as iphone OS Unveiled in 2007 Current version is 8.3, released April 8, 2015 ios Runs on: iphone ipod Touch

More information

Security of Wireless Networks in Intelligent Vehicle Systems

Security of Wireless Networks in Intelligent Vehicle Systems Security of Wireless Networks in Intelligent Vehicle Systems Syed M. Mahmud and Shobhit Shanker Electrical and Computer Engg. Dept. Wayne State University Detroit, MI 48202 Email: smahmud@eng.wayne.edu

More information

Define the term, computer, and describe the relationship between data and information

Define the term, computer, and describe the relationship between data and information Discovering Computers 2010 Living in a Digital World Objectives Overview Explain why computer literacy is vital to success in today s world Define the term, computer, and describe the relationship between

More information

The Data Breach: How to Stay Defensible Before, During & After the Incident

The Data Breach: How to Stay Defensible Before, During & After the Incident The Data Breach: How to Stay Defensible Before, During & After the Incident Alex Ricardo Beazley Insurance Breach Response Services Lynn Sessions Baker Hostetler Partner Michael Bazzell Computer Security

More information

Question: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break.

Question: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break. 1 ISC - SSCP System Security Certified Practitioner (SSCP) Question: 1 DES - Data Encryption standard has a 128 bit key and is very difficult to break. Question: 2 What is the main difference between computer

More information

Foothill-De Anza Community College District Wireless Networking Guidelines. Problems Connecting to or Using the Wireless Network

Foothill-De Anza Community College District Wireless Networking Guidelines. Problems Connecting to or Using the Wireless Network Foothill-De Anza Community College District Wireless Networking Guidelines Problems Connecting to or Using the Wireless Network My login name and password are not working. HELP! There are different wireless

More information

The Scenes of Cyber Crime

The Scenes of Cyber Crime Organizer: BRIDGING BARRIERS: LEGAL AND TECHNICAL OF CYBERCRIME CASES The Scenes of Cyber Crime 5 July 2011 Toralv Dirro EMEA Security Strategist, McAfee Labs Low Risk + High Profit -> Crime 500,000 Cyber

More information

USER GUIDE KASPERSKY MOBILE SECURITY 8.0

USER GUIDE KASPERSKY MOBILE SECURITY 8.0 USER GUIDE KASPERSKY MOBILE SECURITY 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.

More information

Hacking Demonstration. Dr John McCarthy Ph.D. BSc (Hons) MBCS

Hacking Demonstration. Dr John McCarthy Ph.D. BSc (Hons) MBCS Hacking Demonstration Dr John McCarthy Ph.D. BSc (Hons) MBCS Demonstration Deploying effective cyber security is one of the 21 st century s greatest challenges for business. The threats facing businesses

More information

LOCATION DATA. Location information from mobile devices is typically obtained using the following:

LOCATION DATA. Location information from mobile devices is typically obtained using the following: LOCATION DATA Location information from mobile devices is typically obtained using the following: 1. Cell PING (Triangulation) 2. Stingray device 3. Wi-Fi, Bluetooth tracking 4. Apps and Web browsing 5.

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

e-pg Pathshala Subject : Computer Science Paper: Embedded System Module: Microcontrollers and Embedded Processors Module No: CS/ES/2 Quadrant 1 e-text

e-pg Pathshala Subject : Computer Science Paper: Embedded System Module: Microcontrollers and Embedded Processors Module No: CS/ES/2 Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Paper: Embedded System Module: Microcontrollers and Embedded Processors Module No: CS/ES/2 Quadrant 1 e-text In this module, microcontrollers and embedded processors

More information

Verified by VINtrack

Verified by VINtrack Verified by VINtrack VINtrack Software is the only VIN barcode software in the world that catches counterfeits and clones with its unique database. Just ONE stolen vehicle recovery will pay for the unit

More information

Understanding Managed Services

Understanding Managed Services Understanding Managed Services The buzzword relating to IT Support is Managed Services, and every day more and more businesses are jumping on the bandwagon. But what does managed services actually mean

More information

Global Mobile Consumer Survey, US Edition Overview of results

Global Mobile Consumer Survey, US Edition Overview of results Global Mobile Consumer Survey, US Edition Overview of results Smartphones front and center Mobile phones are still on the rise, in number and importance Smartphone ownership reached 85% (a YoY increase

More information

M.A.M System. Final Report. Apper: Jingdong Su Programmer: Jianwei Xu and Yunan Zhao. Wordcount: Mobile Aided Manufacturing

M.A.M System. Final Report. Apper: Jingdong Su Programmer: Jianwei Xu and Yunan Zhao. Wordcount: Mobile Aided Manufacturing M.A.M System Mobile Aided Manufacturing Final Report Wordcount:1660+300 Apper: Jingdong Su Programmer: Jianwei Xu and Yunan Zhao 1.Introduction Our Application is aim to help the user to have a better

More information

Security Vulnerabilities of Apple iphone Fingerprint Authentication. Suruchi Devanahalli

Security Vulnerabilities of Apple iphone Fingerprint Authentication. Suruchi Devanahalli 1 Security Vulnerabilities of Apple iphone Fingerprint Authentication Suruchi Devanahalli 2 Contents 1. Abstract 2. Introduction 2.1 The Touch ID sensor and the Secure Enclave 2.2 Fingerprint scan analysis

More information

Understanding Internet Speed Test Results

Understanding Internet Speed Test Results Understanding Internet Speed Test Results Why Do Some Speed Test Results Not Match My Experience? You only have to read the popular press to know that the Internet is a very crowded place to work or play.

More information

SOLUTION BRIEF. Video Changes the Future of Policing

SOLUTION BRIEF. Video Changes the Future of Policing SOLUTION BRIEF Video Changes the Future of Policing Abstract Public safety organizations continuously look for new tools to help them better serve and protect the citizens of the community as well as to

More information

Protect Yourself From. Identify Theft

Protect Yourself From. Identify Theft Protect Yourself From Identify Theft What is Identity Theft? Identity theft occurs when someone uses another person identifying information without their permission in order to access resources, obtain

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is

More information

The State of the American Traveler TM

The State of the American Traveler TM The State of the American Traveler TM MOBILE EDITION Fall 2018 Volume 30 The Mobile Edition THIS FALL EDITION of The State of the American Traveler TM continues our ongoing exploration of travelers use

More information

IPLocks Vulnerability Assessment: A Database Assessment Solution

IPLocks Vulnerability Assessment: A Database Assessment Solution IPLOCKS WHITE PAPER September 2005 IPLocks Vulnerability Assessment: A Database Assessment Solution 2665 North First Street, Suite 110 San Jose, CA 95134 Telephone: 408.383.7500 www.iplocks.com TABLE OF

More information

Digital Forensics at a University. Calvin Weeks Director, Oklahoma Digital Forensics Lab University of Oklahoma

Digital Forensics at a University. Calvin Weeks Director, Oklahoma Digital Forensics Lab University of Oklahoma Digital Forensics at a University Calvin Weeks Director, University of Oklahoma Calvin Weeks Director, Former Director of IT Security Certified EnCASE Examiner (EnCE) VP of the local chapter of HTCIA Co-Chair

More information

1-7 Attacks on Cryptosystems

1-7 Attacks on Cryptosystems 1-7 Attacks on Cryptosystems In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from

More information

Welcome to Windows 10. Love it or Avoid it

Welcome to Windows 10. Love it or Avoid it 1 Welcome to Windows 10 Love it or Avoid it 2 What is an OPERATING SYSTEM??? 1) It s a set of programs that control the computer and make the components work together 2) It provides a interface between

More information

IT & DATA SECURITY BREACH PREVENTION

IT & DATA SECURITY BREACH PREVENTION IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part 1: Reducing Employee and Application Risks CONTENTS EMPLOYEES: IT security hygiene best practice APPLICATIONS: Make patching a priority AS CORPORATE

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Military Forensics COLLECT, EXPLOIT, AND REACT IN THE FIELD

Military Forensics COLLECT, EXPLOIT, AND REACT IN THE FIELD Military Forensics COLLECT, EXPLOIT, AND REACT IN THE FIELD Military Forensics : COLLECT, EXPLOIT, AND REACT IN THE FIELD 2 Collect, Exploit, and React in the Field Timely access to battlefield intelligence

More information

Chapter 1- The Blender Interface

Chapter 1- The Blender Interface Chapter 1- The Blender Interface The Blender Screen Years ago, when I first looked at Blender and read some tutorials I thought that this looked easy and made sense. After taking the program for a test

More information

Standards for Test Automation

Standards for Test Automation Standards for Test Automation Brian Tervo Windows XP Automation Applications Compatibility Test Lead Microsoft Corporation Overview Over the last five years, I ve had the opportunity to work in a group

More information

MODULE No. 33: Digital Crime Scene Investigation

MODULE No. 33: Digital Crime Scene Investigation SUBJECT Paper No. and Title Module No. and Title Module Tag FSC_P16_M33 TABLE OF CONTENTS 1. Learning Outcomes 2. Introduction 3. Digital Crime Scene Investigation. 3.1 What Is Digital Evidence? 3.2 Working

More information

Children, Mobile Phones and the Internet

Children, Mobile Phones and the Internet Children, Mobile Phones and the Internet Experts Meeting Mitsubishi Research Institute Tokyo, March, 2003 The largest independent provider of services to families and children in the UK 5000 full-time

More information

Copyright 2016

Copyright 2016 This video will look at some naming convention that can be used on networks for computers, e-mail and file shares. There are many different naming conventions used in the world and these are just some

More information

NCMail: Microsoft Outlook User s Guide

NCMail: Microsoft Outlook User s Guide NCMail: Microsoft Outlook 2003 Email User s Guide Revision 1.0 11/10/2007 This document covers how to use Microsoft Outlook 2003 for accessing your email with the NCMail Exchange email system. The syntax

More information

24/7 Instant Technical Support Designed for Non-Geeks

24/7 Instant Technical Support Designed for Non-Geeks Fast & Flawless: iprotector 24/7 Instant Technical Support Designed for Non-Geeks RESCUECOM s ground breaking, revolutionary software and flawless service means you get the support you need, the moment

More information

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1 The Cyber Threat Bob Gourley, Partner, Cognitio June 22, 2016 How we think. 1 About This Presentation Based on decades of experience in cyber conflict Including cyber defense, cyber intelligence, cyber

More information

Learning Objectives: Topic Karnaugh Maps. At the end of this topic you will be able to;

Learning Objectives: Topic Karnaugh Maps. At the end of this topic you will be able to; Topic.2.3 Karnaugh Maps Learning Objectives: t the end of this topic you will be able to; Draw a Karnaugh map for a logic system with up to four inputs and use it to minimise the number of gates required;

More information

MOVE IN INFORMATION Strong's Student Rentals KEEP Kimmel Rd. Home, PA Office:

MOVE IN INFORMATION Strong's Student Rentals KEEP Kimmel Rd. Home, PA Office: MOVE IN INFORMATION Strong's Student Rentals KEEP 13-14 442 Kimmel Rd. Home, PA 15747 Office: 724-463-7222 Tenants, Hello and welcome to Strong s Student Rentals. This packet contains important information,

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER. When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the

More information

BOSCH CASE STUDY. How Bosch Has Benefited from GENIVI Adoption

BOSCH CASE STUDY. How Bosch Has Benefited from GENIVI Adoption February 2016 BOSCH CASE STUDY How Bosch Has Benefited from GENIVI Adoption Overview The GENIVI Alliance was launched with a mission of driving the broad adoption of open source, In-Vehicle Infotainment

More information

Manually Sync Ipod Touch Music To Pc Transfer 2012

Manually Sync Ipod Touch Music To Pc Transfer 2012 Manually Sync Ipod Touch Music To Pc Transfer 2012 I want to transfer my music on my Ipod nano, which is synced to the old MacBook, to my new For ipod touch sync with itunes, please follow these steps:

More information

Office 365 Portal, OneDrive, & Delve

Office 365 Portal, OneDrive, & Delve Office 365 Portal, OneDrive, & Delve Training Packet Welcome to Technology Solution s Office 365, OneDrive, and Delve training! We will use this packet as a guide throughout today s training. We ll introduce

More information

TOP 10 Vulnerability Trends for By Nevis Labs

TOP 10 Vulnerability Trends for By Nevis Labs TOP Vulnerability Trends for 28 By Nevis Labs Date: December 11, 27 Page 1 It s the last month of 27 and the time is right to look back at the year and predict the vulnerability trends for 28. A quick

More information

Syllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview

Syllabus. Course Title: Cyber Forensics Course Number: CIT 435. Course Description: Prerequisite Courses: Course Overview Syllabus Course Title: Cyber Course Number: CIT 435 Course Description: Introduces the principles and practices of digital forensics including digital investigations, data and file recovery methods, and

More information

A Criminal Intrudes into a Bank in Geneva Korean agents. Canadian agents make the arrest. Argentinian investigators. discover. attack came from Seoul

A Criminal Intrudes into a Bank in Geneva Korean agents. Canadian agents make the arrest. Argentinian investigators. discover. attack came from Seoul Harmonizing National Legal Approaches and International Legal Coordination International Cooperation in Cybercrime Investigations A Law Enforcement Perspective Colonel Claudio Peguero ITU / WSIS Thematic

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of

More information

Mobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter

Mobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter Mobile Devices Presenter Don Mason Associate Director, NCJRL 662-915-6898 drmason@olemiss.edu Questions Feel free to email any time to: drmason@olemiss.edu Please include your phone number In case it might

More information

Your web browser (Safari 7) is out of date. For more security, comfort and the best experience on this site: Update your browser Ignore

Your web browser (Safari 7) is out of date. For more security, comfort and the best experience on this site: Update your browser Ignore Your web browser (Safari 7) is out of date. For more security, comfort and the best experience on this site: Update your browser Ignore SPREADING THE MESS AGE FrontlineSMS uses mobile technology to help

More information

SAFE Home Inventory. Getting Started Guide

SAFE Home Inventory. Getting Started Guide SAFE Home Inventory Getting Started Guide Table of Contents What can I do with SAFE?... 1 Getting started using SAFE... 1 Overview of SAFE screens... 1 Use the collectibles and household items screens...

More information

You Could Kill Someone and Go to Jail for Talking or Texting While Driving California Vehicle Code Sections 23123, 23124

You Could Kill Someone and Go to Jail for Talking or Texting While Driving California Vehicle Code Sections 23123, 23124 You Could Kill Someone and Go to Jail for Talking or Texting While Driving California Vehicle Code Sections 23123, 23124 You Could Kill Someone and Go to Jail for Talking or Texting While Driving California

More information

White Paper Digital Evidence Preservation and Distribution: Updating the Analog System for the Digital World July 2011

White Paper Digital Evidence Preservation and Distribution: Updating the Analog System for the Digital World July 2011 White Paper Digital Evidence Preservation and Distribution: Updating the Analog System for the Digital World July 2011 I. Introduction A majority of crimes committed today have a digital component, and

More information

1.264 Lecture 26. Security protocols. Next class: Anderson chapter 4. Exercise due before class

1.264 Lecture 26. Security protocols. Next class: Anderson chapter 4. Exercise due before class 1.264 Lecture 26 Security protocols Next class: Anderson chapter 4. Exercise due before class 1 Encryption Encryption is the process of: Transforming information (referred to as plaintext) Using an algorithm

More information

Student Name. WTL Research Paper Portable Computer Proposal. June 26, Mrs. Rinaldi

Student Name. WTL Research Paper Portable Computer Proposal. June 26, Mrs. Rinaldi Student Name WTL Research Paper Portable Computer Proposal June 26, 2011 Mrs. Rinaldi The great thing in the world is not so much where we stand, as in what direction we are moving. -Oliver Wendell Holmes

More information

Iphone virus protection

Iphone virus protection Iphone virus protection Search Protect your devices with the best free antivirus on the market. Download Avast antivirus and anti-spyware protection for your PC, Mac and Android. Securely surf on your

More information

BETTER TIPS FOR TAPS LIBRARY TECHNOLOGY CONFERENCE 2017 JUNIOR TIDAL WEB SERVICES & MULTIMEDIA LIBRARIAN NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

BETTER TIPS FOR TAPS LIBRARY TECHNOLOGY CONFERENCE 2017 JUNIOR TIDAL WEB SERVICES & MULTIMEDIA LIBRARIAN NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY BETTER TIPS FOR TAPS LIBRARY TECHNOLOGY CONFERENCE 2017 JUNIOR TIDAL WEB SERVICES & MULTIMEDIA LIBRARIAN NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY OVERVIEW MOBILE USABILITY TESTING MOBILE VS DESKTOP SETTING

More information

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks Overview Handling Security Incidents Chapter 7 Lecturer: Pei-yih Ting Attacks Security Incidents Handling Security Incidents Incident management Methods and Tools Maintaining Incident Preparedness Standard

More information

Beyond the F.U.D. How to start securing your DCS network today.

Beyond the F.U.D. How to start securing your DCS network today. Beyond the F.U.D. (Fear, Uncertainty, and Doubt) Process Systems How to start securing your DCS network today. Securing Your Process Control Network You work in the Process Control industry, so I m sure

More information

Background on North Buckhead s Security Camera Planning

Background on North Buckhead s Security Camera Planning Background on North Buckhead s Security Camera Planning By Gordon Certain NBCA President February,24, 2018 Compared to much of 2016, crime in residential parts of North Buckhead is down. That s the good

More information

Technology Safety Quick Tips

Technology Safety Quick Tips Technology Safety Quick Tips Spyware: Computer & Phone Monitoring Software It enables a person to secretly monitor someone else s entire computer activity. It can be installed remotely by sending an email,

More information

Cyber and data security How prepared is your charity?

Cyber and data security How prepared is your charity? Cyber and data security How prepared is your charity? 1 Executive summary In this report we reveal the results of our survey 54% of respondents didn t know or said their charity was not well equipped to

More information

All Voice over IP Explanations V0.2

All Voice over IP Explanations V0.2 V0.2 May 2017 Page 1 of 7 Contents 1 All IP Transformation... 3 1.1. Why All IP... 3 1.1.1 Many important benefits... 3 1.1.2 Flexible... 3 1.1.3 Simple... 3 1.1.4 Efficient... 3 1.2. Managing the transformation...

More information