Friday, February 14, 2020

Forensic Evidence Research Paper Example | Topics and Well Written Essays - 1250 words

Forensic Evidence - Research Paper Example Current technological trends have revolutionized the methods of storing data along with different advanced access mechanisms. These systems facilitate law enforcement agencies by providing instant access to these characteristics. Although, computer forensics also facilitates in investigation of crimes within themselves in order to gather evidence associated with criminal activities that breaches violation of an organizations policy. The data can be extracted from storage devices including hard drives, flash drives, memory cards etc (Computer forensics – a critical need in computer, n.d ) Every online user leaves behind logs related to activities that he or she performs online. This digital traceability can reveal activities that are performed by the user on the Internet by identifying who has identified which files along with logs of each website visited. Temporary files can also reveal flash templates and buffered videos. These traceable logs, files, cookies, templates can fa cilitate a great deal to analyze crimes that are committed from computers and may provide solid evidence against the hacker or cyber-criminal. However, many users trust in files after deleting them from the hard drive but there are many ways and methods via which these files can be recovered. The operating system usually does not delete complete files from the hard drive, even if the user deletes the files from the recycling bin. The files are still present, until they are replaced or overwritten by new files. These traceability factors can lead to aid in forensic investigations and can track down criminals by investigating their computer. For instance, during the execution of a search warrant at the residence of John Robinson who was a serial killer, law enforcement agencies discovered two bodies that were badly decomposed along with seizing of five computers (Computer forensics, n.d ). After investigating computers, it was discovered that the serial killer John Robinson was using internet to find people to schedule a meeting. Afterwards they were killed by sexually assaulting them. These facts were only possible by forensic computing techniques and were not possible by physical evidence and investigation (Computer forensics, n.d ). However, many techniques are associated with forensic computing, few techniques are categorized in to two groups i.e. Graphical User Interface (GUI) based forensic tools and Command line forensic tools (Conklin 2005). The command line tools are relatively small, they can be stored in floppy disks as compared to heavy, and slow GUI based forensic tools. However, command line tools also share some disadvantages in terms of their limitations as they are not capable to identify .zip files and .cab files. GUI based tools provide a graphical user interface and is said to be user friendly because specialized knowledge is not required as compared to command line tools requiring commands on every operation. The disadvantage for GUI based t ools is that they are large and cannot be saved in a floppy disk (Conklin 2005). Similarly, organizations also require a proactive approach for threats that may penetrate within the internal network and extracts or expose sensitive information. There are many ways of forensic data acquisition on a network; we will only consider best practices. Network-Based Evidence Acquisition Practices Network management is effective on many vital management functions. If any one of them is not properly configured, effective network management is not possible. Data acquisition is classified as a vital management process that needs to be addresses proficiently. Likewise, Wireshark will only utilize data that is available

Saturday, February 1, 2020

MSc computer system security 'RFID' Essay Example | Topics and Well Written Essays - 5000 words

MSc computer system security 'RFID' - Essay Example The prime advantage of RFID technology is its ease of use and minimalism. RFID replaces barcodes and is a time saving, effective and reliable alternative. That is the reason why it is adopted and deployed in multipurpose applications i.e. Supply Chain Management (SCM), Inventory Tracking, Theft Protection, Location based Services, Electronic Health Monitoring for health care systems, RFID integrated travel documents, payment systems and context-aware applications. In recent years, this technology is flourishing robustly due to its extensive usability in upcoming technologies i.e. Ubiquitous Computing, Pervasive Computing or Ambient Intelligence Solutions. RFID technology comprises of transmitters spreading electromagnetic technology in the environment to send and receive signals. The communication is conducted between two elements, transceiver and transponder. 2. Radio Frequency James Clerk formulated its principles in 19th Century [9]. The radio waves propagation is emitted the form of electromagnetic waves and promulgate in speed of light. The applications of radio waves consist of Radar systems, Fixed Mobile and Satellite Communication, Media Broadcasting and Computer Networks. Radio waves can utilize different band of frequencies measured in Hertz (Hz) which represents the natural process of oscillation in waves. RFID technology utilizes Low Frequency (LF), High Frequency (HF) and Ultra High Frequency (UHF) from the electromagnetic spectrum. Light waves have certain limitations when passing through objects. On the other hand radio waves travel through solid objects and opaque materials. The range of radio frequency waves which is currently used illustrates the following ranges; 30 KHz and 30 GHz [9]. Table 1 from [9] defines the bands in the electromagnetic spectrum. 3. Barcodes and RFID There is always a logical concept of analyzing RFID as a better substitute for the barcodes systems. However, the consideration of difference between these two technologies is imperative in order to deploy them successfully. Undeniably, RFID technology does not entail a line of sight to read the tags as compared to barcodes, where it is mandatory to identify the tag optically to scan it within a squat distance. Furthermore, in RFID technology, the space for data in a tag can be more than 100 bytes which is far greater than the maximum space available in barcodes. The available storage space provides the freedom to assign identification numbers not only to a brand but also to each item individually. The valuable functionality of identifying multiple tags concurrently enhances the efficiency in any operational environment employing this technology. On the other hand, RFID technology is prone in terms of attenuation and propagation problems hereditary from radio frequency, more specifically in the existence of metal or liquid. It is also a cheaper deployment as compared to barcode technology. Consequently, RFID industry stakeholders are working tirelessl y to minimize the cost of RFID technology. The efforts are making the component prices lower, which are vital in calculating a cost of any RFID solution. As per the report in 2006, the RFID tag price will be around five cents [10]. 4. RFID Privacy and Security The protection related to privacy and security incorporated with RFID technology cannot be rectified without analyzing causes and driving factors. While ease of use and cost are the most significant factors, accumulation of