首页 > 最新文献

CompSciRN: Digital Forensics (Topic)最新文献

英文 中文
A Comparative Study of Analysis and Investigation using Digital Forensics 数字取证分析与调查的比较研究
Pub Date : 2020-06-04 DOI: 10.30726/ijlca/v7.i2.2020.72004
Nikunj Pansari, A. Agarwal
Data Analysis and Investigation using Digital forensics from Digital Storage Devices, is a defined way towards effective data backup strategies, as well as a key aspect in Data Privacy and Confidentiality. Digital storage Devices like Hard Drives (internal or external), USB Drives, floppy disks, etc. provide a good medium for better utilisation and storage of data and information. So, the main task is to retrieve the stolen or lost data from these devices. Digital forensics provides the exact concept for this data extraction, in a systematic and effective manner. Now, there can be various conditions of a damaged digital storage device like it may be burnt, wet or physically damaged parts, all these conditions play a significant role in Data Extraction. Since, Data is the most important asset for any organisation, so compromising with its Security and Confidentiality, may be wrong or devastating option, for future. Just spending thousands and millions of dollars in finding the vulnerability (large-scale or small-scale), is not a solution for being secure. There has to be proper and effective choice of ways and tools for it.
使用数字存储设备的数字取证进行数据分析和调查,是实现有效数据备份策略的一种明确方法,也是数据隐私和机密性的关键方面。数码储存装置,如硬碟机(内置或外置)、USB装置、软盘等,为更好地利用和储存数据和资讯提供了良好的媒介。因此,主要任务是从这些设备中检索被盗或丢失的数据。数字取证以系统和有效的方式为这种数据提取提供了确切的概念。现在,数字存储设备的损坏可能会有各种各样的情况,比如它可能被烧毁、潮湿或物理损坏的部件,所有这些情况在数据提取中都起着重要的作用。因为,数据是任何组织最重要的资产,因此,对其安全性和保密性妥协,可能是错误的或毁灭性的选择,在未来。仅仅花费成千上万美元来寻找漏洞(大规模或小规模)并不是安全的解决方案。必须有适当和有效的方式和工具的选择。
{"title":"A Comparative Study of Analysis and Investigation using Digital Forensics","authors":"Nikunj Pansari, A. Agarwal","doi":"10.30726/ijlca/v7.i2.2020.72004","DOIUrl":"https://doi.org/10.30726/ijlca/v7.i2.2020.72004","url":null,"abstract":"Data Analysis and Investigation using Digital forensics from Digital Storage Devices, is a defined way towards effective data backup strategies, as well as a key aspect in Data Privacy and Confidentiality. Digital storage Devices like Hard Drives (internal or external), USB Drives, floppy disks, etc. provide a good medium for better utilisation and storage of data and information. So, the main task is to retrieve the stolen or lost data from these devices. Digital forensics provides the exact concept for this data extraction, in a systematic and effective manner. Now, there can be various conditions of a damaged digital storage device like it may be burnt, wet or physically damaged parts, all these conditions play a significant role in Data Extraction. Since, Data is the most important asset for any organisation, so compromising with its Security and Confidentiality, may be wrong or devastating option, for future. Just spending thousands and millions of dollars in finding the vulnerability (large-scale or small-scale), is not a solution for being secure. There has to be proper and effective choice of ways and tools for it.","PeriodicalId":292423,"journal":{"name":"CompSciRN: Digital Forensics (Topic)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132294064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information and Communication Technologies, Protests, and Censorship 信息和通信技术、抗议和审查
Pub Date : 2019-08-20 DOI: 10.2139/ssrn.2978549
M. Ananyev, Dimitrios Xefteris, Galina Zudenkova, M. Petrova
We develop a theory of information flows and political regime change, when citizens use information and communication technologies (ICTs) for both information acquisition and protest coordination. Governments can respond by obfuscation of citizens' signal or by restricting access to ICTs used for coordination. We find that introduction of communication technologies lowers the probability of regime survival, but this effect is weaker in economies that do not use ICTs for production. We also expect less competent governments to use coordination censorship, though this effect is weaker in economies that use ICTs extensively. Some high-frequency empirical evidence is consistent with our predictions.
当公民利用信息和通信技术(ICTs)获取信息并协调抗议活动时,我们提出了信息流动和政治体制变革的理论。政府可以通过混淆公民信号或限制获取用于协调的信息和通信技术来应对。我们发现,通信技术的引入会降低政权存续的概率,但在不使用信息和通信技术进行生产的经济体中,这种效应较弱。我们还预计能力较弱的政府会采用协调审查制度,但在广泛使用信息和通信技术的经济体中,这种效应较弱。一些高频率的经验证据与我们的预测是一致的。
{"title":"Information and Communication Technologies, Protests, and Censorship","authors":"M. Ananyev, Dimitrios Xefteris, Galina Zudenkova, M. Petrova","doi":"10.2139/ssrn.2978549","DOIUrl":"https://doi.org/10.2139/ssrn.2978549","url":null,"abstract":"We develop a theory of information flows and political regime change, when citizens use information and communication technologies (ICTs) for both information acquisition and protest coordination. Governments can respond by obfuscation of citizens' signal or by restricting access to ICTs used for coordination. We find that introduction of communication technologies lowers the probability of regime survival, but this effect is weaker in economies that do not use ICTs for production. We also expect less competent governments to use coordination censorship, though this effect is weaker in economies that use ICTs extensively. Some high-frequency empirical evidence is consistent with our predictions.","PeriodicalId":292423,"journal":{"name":"CompSciRN: Digital Forensics (Topic)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129770185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Performance Analysis of DDoS Attack in SDN Network SDN网络中DDoS攻击的性能分析
Pub Date : 2019-03-14 DOI: 10.2139/ssrn.3384009
A. Dumka, P. Bansal
Software Defined network is one of the emerging technology which enhances the working of network by merging the concept of networking with software, where network is manageable by means of software. This technology changes the way of working of networking at a glance. Security is one of the issue with any networking technology as a single intrusion may cost the entire network. Distributed denial-of-service is one of the security issue which attack the system and hampered the normal working of the system. This paper discusses about security within software defined network taking the case of denial of service attack and discuss how Denial of service attack affects the performance of the software defined network taking parameter of entropy for measuring the performance of software defined network.
软件定义网络是将网络的概念与软件相结合,通过软件对网络进行管理,增强网络工作能力的新兴技术之一。这项技术改变了网络的工作方式。安全是任何网络技术的问题之一,因为一次入侵可能会使整个网络付出代价。分布式拒绝服务是攻击系统、阻碍系统正常工作的安全问题之一。本文以拒绝服务攻击为例,讨论了软件定义网络的安全问题,并以熵的参数来衡量软件定义网络的性能,讨论了拒绝服务攻击对软件定义网络性能的影响。
{"title":"Performance Analysis of DDoS Attack in SDN Network","authors":"A. Dumka, P. Bansal","doi":"10.2139/ssrn.3384009","DOIUrl":"https://doi.org/10.2139/ssrn.3384009","url":null,"abstract":"Software Defined network is one of the emerging technology which enhances the working of network by merging the concept of networking with software, where network is manageable by means of software. This technology changes the way of working of networking at a glance. Security is one of the issue with any networking technology as a single intrusion may cost the entire network. Distributed denial-of-service is one of the security issue which attack the system and hampered the normal working of the system. This paper discusses about security within software defined network taking the case of denial of service attack and discuss how Denial of service attack affects the performance of the software defined network taking parameter of entropy for measuring the performance of software defined network.","PeriodicalId":292423,"journal":{"name":"CompSciRN: Digital Forensics (Topic)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124677893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
CompSciRN: Digital Forensics (Topic)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1