|Total results: 453||
|Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
Maria Manuela Cruz-Cunha, Irene Maria Portela.
In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole.
Cybercrime and Cloud Forensics: Applications for Investigation Processes
While cloud computing continues to transform developments in information technology services, these advancements have contributed to a rise in cyber attacks; producing an urgent need to extend the applications of investigation processes.Cybercrime and Cloud Forensics: Applications for Investigation...
Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security
The revolutionary way in which modern technologies have enabled us to exchange information with ease has created a demand for interdisciplinary research in digital forensics and investigations aiming to combat the abuse of computer technologies.Emerging Digital Forensics Applications for Crime...
Digital Forensic Investigation and Cloud Computing
Joshua I. James, Ahmed F. Shosha, Pavel Gladyshev.
This chapter aims to be a high-level introduction into the fundamental concepts of both digital forensic investigations and cloud computing for non-experts in one or both areas. Once fundamental concepts are established, this work begins to examine cloud computing security-related questions...
Hack the Cloud: Ethical Hacking and Cloud Forensics
The goal of this chapter is to explain the challenges that the forensic investigator faces when investigating Cloud Crime and how they can learn from the techniques used by Ethical Hackers to improve their investigation technique. The security threat posed by hackers on the Internet is constantly...
Challenges to Digital Forensic Evidence in the Cloud
Digital forensic evidence is subject to a variety of challenges, and these challenges apply in the Cloud as anywhere else. This chapter is an overview of these issues specifically oriented toward the Cloud Computing environments of today.
The Emergence of Cloud Storage and the Need for a New Digital Forensic Process Model
Cloud computing is just one of many recent technologies that have highlighted shortcomings in the development of formal digital forensic processes, which up until now have been focused on a particular group of practitioners, such as law enforcement, and have been too high-level to be of significant...
Forensic Readiness in the Cloud (FRC): Integrating Records Management and Digital Forensics
Kirsten Ferguson-Boucher, Barbara Endicott-Popovsky.
This chapter focuses on a theoretical approach to proactive evidence collection and presents a conceptual approach for the Cloud. Forensic Readiness in the Cloud (FRC) calls upon technological and organizational strategies to address the risks that threaten organizational information. The two...
Security Architecture and Forensic Awareness in Virtualized Environments
Just about every technology magazine and article published today mentions virtualization or cloud computing. Technically, the two are different but very much intertwined. When environments use virtualization, there are artifacts an investigator can request that may provide valuable information. The...
Seizing Electronic Evidence from Cloud Computing Environments
Despite a growing adoption of cloud computing, law enforcement and the judicial system are unprepared to prosecute cloud-based crimes. This chapter illuminates legal problems in the United States for electronic discovery and digital forensics arising from cloud computing and argues that cloud computing...
Legal Process and Requirements for Cloud Forensic Investigations
Ivan Orton, Aaron Alva, Barbara Endicott-Popovsky.
For the emerging field of cloud forensics, the development of validated and repeatable scientific processes for conducting cloud forensic investigations should include requirements that establish evidence collected as legally admissible. There is currently an uncertainty in the legal requirements for...
Compliance in the Cloud and the Implications on Electronic Discovery
Cloud Computing will be a disruptive technology that will ultimately change the face of computing with a market approaching $300 billion over the next five years, according to recent study from the Market Intel Group (Mathews, 2010). The unstoppable migration of data to the Cloud is undoubtedly due to...
Data Recovery Strategies for Cloud Environments
Theodoros Spyridopoulos, Vasilios Katos.
Data acquisition and data recovery are essential to any e-discovery or digital forensic process. However, these two aspects seem to be considerably difficult in a cloud-computing environment. The very nature of the Cloud raises a number of technical and organizational challenges, which renders...
Forensics as a Service
Jon Rav Gagan Shende.
In today’s dynamic information technology system, one area of tremendous focus and recent growth has been that of the cloud-computing model in its various offerings. With this growth, however, come new challenges within the realms of e-discovery and digital forensics, as we traditionally know it. The...
Forensics as a Service
Dener Didoné, Ruy J. G. B. de Queiroz.
Cloud computing as a paradigm shift is transforming how services are being delivered. In this chapter, the authors present a Forensics as a Service (FaaS) model using cloud computing to deliver forensic services. This model leverages the flexibility, elasticity, and dynamics of cloud computing, and is...
A Forensic-as-a-Service Delivery Platform for Law Enforcement Agencies
Fabio Marturana, Simone Tacconi, Giuseppe F. Italiano.
With the global diffusion of cybercrime, the ever-growing market penetration of high-performance and low-cost personal digital devices, and the commercial success of cloud computing, the area of digital forensics is faced with various new challenges that must be taken seriously. In this chapter, the...
Designing a Forensic-Enabling Cloud Ecosystem
Cloud computing is a major transition, and it comes at a unique historical and strategic time for applying foundational design thinking to secure the next-generation computing infrastructure and enable waves of business and technological innovation. In this chapter, the researcher summarizes six key...
Fingerprint Liveness Detection Based on Fake Finger Characteristics
Gian Luca Marcialis, Pietro Coli, Fabio Roli.
The vitality detection of fingerprints is currently acknowledged as a serious issue for personal identity verification systems. This problem, raised some years ago, is related to the fact that the 3d shape pattern of a fingerprint can be reproduced using artificial materials. An image quite similar to...
Daubechies Wavelets Based Robust Audio Fingerprinting for Content-Based Audio Retrieval
Wei Sun, Zhe-Ming Lu, Fa-Xin Yu, Rong-Jun Shen.
Audio fingerprinting is the process to obtain a compact content-based signature that summarizes the essence of an audio clip. In general, existing audio fingerprinting schemes based on wavelet transforms are not robust against large linear speed changes. The authors present a novel framework for...
An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery
Yongjian Hu, Chang-Tsun Li, Yufei Wang, Bei-bei Liu.
Frame duplication is a common way of digital video forgeries. State-of-the-art approaches of duplication detection usually suffer from heavy computational load. In this paper, the authors propose a new algorithm to detect duplicated frames based on video sub-sequence fingerprints. The fingerprints...
An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients
Chang Wang, Jiangqun Ni, Chuntao Wang, Ruiyu Zhang.
Minimizing the embedding impact is a practically feasible philosophy in designing steganographic systems. The development of steganographic systems can be formulated as the construction of distortion profile reflecting the embedding impact and the design of syndrome coding based on a certain code. The...
A Study on Embedding Efficiency of Matrix Encoding
Lifang Yu, Yun Q. Shi, Yao Zhao, Rongrong Ni, Gang Cao.
In this paper, the authors examine embedding efficiency, which influences the most concerned performance of steganography, security, directly. Embedding efficiency is defined as the number of random message bits embedded per embedding change. Recently, matrix embedding has gained extensive attention...
Spam 2.0 State of the Art
Pedram Hayati, Vidyasagar Potdar.
Spam 2.0 is defined as the propagation of unsolicited, anonymous, mass content to infiltrate legitimate Web 2.0 applications. A fake eye-catching profile in social networking websites, a promotional review, a response to a thread in online forums with unsolicited content, or a manipulated Wiki page are...