scholarly journals Data Collection Techniques for Forensic Investigation in Cloud

Author(s):  
Thankaraja Raja Sree ◽  
Somasundaram Mary Saira Bhanu

Author(s):  
Dennis K. Nilsson ◽  
Ulf E. Larson

The introduction of a wireless gateway as an entry point to the automobile in-vehicle network reduces the effort of performing diagnostics and firmware updates considerably. Unfortunately, the same gateway also allows cyber attacks to target the unprotected network which currently lacks proper means for detecting and investigating security-related events. In this article, we discuss how to perform a digital forensic investigation of an in-vehicle network. An analysis of the current features of the network is performed, and an attacker model is developed. Based on the attacker model and a set of generally accepted forensic investigation principles, we derive a list of requirements for detection, data collection, and event reconstruction. We then use the Integrated Digital Investigation Process proposed by Carrier and Spafford (2004) as a template to illustrate how our derived requirements affect an investigation. For each phase of the process, we show the benefits of meeting the requirements and the implications of not complying with them.



Author(s):  
Mital Parekh ◽  
Snehal Jani

The enhancement of technology has led to a considerable amount of growth in number of cases pertaining to cyber-crime and has raised an enormous challenge to tackle it effectively.  There are various cyber forensic techniques and tools used to recover data from the devices to tackle cyber-crime. Present research paper focuses on performing memory forensic and analyzes the memory which contains many pieces of information relevant to forensic investigation, such as username, password, cryptographic keys, deleted files, deleted logs, running processes; that can be helpful to investigate the cyber-crime pining down the accused. The three main steps followed in memory forensic are acquiring, analyzing and recovering. Recovery of the evidences of crime from the volatile memory can be possible with the knowledge of different tools and techniques used in memory forensic.  However, it is always tough to analyze volatile memory as it stays for a very short period. Not all tools can be used for memory forensic in every situation and therefore, it is important to have the knowledge of tools before applying to solve a particular cyber-crime. It is yet to establish on using a single tool for complete investigation, however, most of the tools used are successful in providing reasonable evidences. The present research paper provides an insight on analyzing the memory that stores relevant data, collection of evidences from the device(s), extraction of essential data using different memory forensic tools, tools useful for various purposes and the best suited tool for a particular situation.                                      



Author(s):  
Dennis K. Nilsson ◽  
Ulf E. Larson

The introduction of a wireless gateway as an entry point to the automobile in-vehicle network reduces the effort of performing diagnostics and firmware updates considerably. Unfortunately, the same gateway also allows cyber attacks to target the unprotected network which currently lacks proper means for detecting and investigating security-related events. In this article, we discuss how to perform a digital forensic investigation of an in-vehicle network. An analysis of the current features of the network is performed, and an attacker model is developed. Based on the attacker model and a set of generally accepted forensic investigation principles, we derive a list of requirements for detection, data collection, and event reconstruction. We then use the Integrated Digital Investigation Process proposed by Carrier and Spafford (2004) as a template to illustrate how our derived requirements affect an investigation. For each phase of the process, we show the benefits of meeting the requirements and the implications of not complying with them.



Author(s):  
Prof. Sachin Babulal Jadhav

Digital crimes are taking place over the entire world. For any digital crime which commit at any part of world, computer or any electronic devices are used. The devices which are used to commit the crime are useful evidences which must be identified and protected for further use. The crimes involving electronic devices are called as cyber-crime. To investigate such crimes, a scientific procedures needs to be followed. The data collection, analysis, preservation and presentation of digital evidence is must in order investigate the cybercrime. This paper highlights the practices that are used worldwide in the investigation process of cyber-crime. Keywords: Digital Forensics, Analysis, Investigation, models of investigation.



Author(s):  
S.W. Hui ◽  
D.F. Parsons

The development of the hydration stages for electron microscopes has opened up the application of electron diffraction in the study of biological membranes. Membrane specimen can now be observed without the artifacts introduced during drying, fixation and staining. The advantages of the electron diffraction technique, such as the abilities to observe small areas and thin specimens, to image and to screen impurities, to vary the camera length, and to reduce data collection time are fully utilized. Here we report our pioneering work in this area.



Author(s):  
Weiping Liu ◽  
Jennifer Fung ◽  
W.J. de Ruijter ◽  
Hans Chen ◽  
John W. Sedat ◽  
...  

Electron tomography is a technique where many projections of an object are collected from the transmission electron microscope (TEM), and are then used to reconstruct the object in its entirety, allowing internal structure to be viewed. As vital as is the 3-D structural information and with no other 3-D imaging technique to compete in its resolution range, electron tomography of amorphous structures has been exercised only sporadically over the last ten years. Its general lack of popularity can be attributed to the tediousness of the entire process starting from the data collection, image processing for reconstruction, and extending to the 3-D image analysis. We have been investing effort to automate all aspects of electron tomography. Our systems of data collection and tomographic image processing will be briefly described.To date, we have developed a second generation automated data collection system based on an SGI workstation (Fig. 1) (The previous version used a micro VAX). The computer takes full control of the microscope operations with its graphical menu driven environment. This is made possible by the direct digital recording of images using the CCD camera.



1997 ◽  
Vol 6 (4) ◽  
pp. 34-47 ◽  
Author(s):  
Steven H. Long ◽  
Lesley B. Olswang ◽  
Julianne Brian ◽  
Philip S. Dale

This study investigated whether young children with specific expressive language impairment (SELI) learn to combine words according to general positional rules or specific, grammatic relation rules. The language of 20 children with SELI (4 females, 16 males, mean age of 33 months, mean MLU of 1.34) was sampled weekly for 9 weeks. Sixteen of these children also received treatment for two-word combinations (agent+action or possessor+possession). Two different metrics were used to determine the productivity of combinatorial utterances. One metric assessed productivity based on positional consistency alone; another assessed productivity based on positional and semantic consistency. Data were analyzed session-by-session as well as cumulatively. The results suggest that these children learned to combine words according to grammatic relation rules. Results of the session-by-session analysis were less informative than those of the cumulative analysis. For children with SELI ready to make the transition to multiword utterances, these findings support a cumulative method of data collection and a treatment approach that targets specific grammatic relation rules rather than general word combinations.



2019 ◽  
Vol 4 (2) ◽  
pp. 356-362
Author(s):  
Jennifer W. Means ◽  
Casey McCaffrey

Purpose The use of real-time recording technology for clinical instruction allows student clinicians to more easily collect data, self-reflect, and move toward independence as supervisors continue to provide continuation of supportive methods. This article discusses how the use of high-definition real-time recording, Bluetooth technology, and embedded annotation may enhance the supervisory process. It also reports results of graduate students' perception of the benefits and satisfaction with the types of technology used. Method Survey data were collected from graduate students about their use and perceived benefits of advanced technology to support supervision during their 1st clinical experience. Results Survey results indicate that students found the use of their video recordings useful for self-evaluation, data collection, and therapy preparation. The students also perceived an increase in self-confidence through the use of the Bluetooth headsets as their supervisors could provide guidance and encouragement without interrupting the flow of their therapy sessions by entering the room to redirect them. Conclusions The use of video recording technology can provide opportunities for students to review: videos of prospective clients they will be treating, their treatment videos for self-assessment purposes, and for additional data collection. Bluetooth technology provides immediate communication between the clinical educator and the student. Students reported that the result of that communication can improve their self-confidence, perceived performance, and subsequent shift toward independence.



ASHA Leader ◽  
2009 ◽  
Vol 14 (4) ◽  
pp. 7-28
Author(s):  
Jaumeiko Brown
Keyword(s):  


Sign in / Sign up

Export Citation Format

Share Document