dfm covers
 
 

In This Issue

Written by DFMag


Issue 17 - Out now!

Here's a quick review of some of the main articles within Issue 17


Issue 17 of Digital Forensics Magazine brings new techniques and ideas to the industry. Subscribe today to ensure you get digital access, or if you want, subscribe to the print edition. Find out more at our subscriptions pages.

Here's just a few of the fantastic articles inside Issue 17...


An Overview of Honeypots & SCADA Systems

In this article Andrew Nicholson introduces honeypots for SCADA systems and presents a short study of the current landscape of SCADA honeypots. SCADA honeypots offer an insight into the tools, techniques and procedures used by adversaries that target these systems and can help towards attribution. They also act as early warning systems, provide threat intelligence and divert attacks away from production systems.


Trustworthy Cyber Physical Systems

In this article Hugh Boyse takes a look at how given the increasing prevalence of cyber-physical systems in both the critical national infrastructure and in an emergent Internet of Things, our safety and security depends on their trustworthy operation. The combination of interconnectivity and the dynamic nature of many cyber-physical systems, presents new challenges if we are to reduce the risk of cascading or escalating failures.


Forensic Response to Cyber Terror Takedown

The realization that 99.9% of crimes now tend to have an association with some form of computing, be that, a laptop, cell phone, or other forms of communications. ‘Cyber Forensics’, and ‘First Responder Cyber Response’ are inextricably linked and John Walker considers an attack and how to respond and investigate.


Using Network Intrusion Detection Systems to Acquire Evidence

An important digital forensics process related to security hacking incidents is to collect information from log meta data that are stored in network firewalls, network intrusion detection systems (NIDS), databases, web servers and operation systems. However, the main problem with these logs is that they are designed for debugging systems and that they are often lacking capability for forensics purposes. Muteb Alqahtani & Brian Cusack investigate.

iPhone Backup Files

Part two of this article provides the readers with a realistic experience as they are taken through a hypothetical storyline that was formulated, whilst being provided with recommendations as to where specific valuable artefacts can be located and other tips to aid the forensic investigation process. It demonstrates the techniques utilized, hypotheses made and new advancements that were uncovered.


Erasure Tool Performance Can Beat the Best Intentions

Andrew Woodward and Brian Cusack take a look at how privacy protection is at risk with poor tool performance when it comes to using Secure Erasure Tools. Investigating a number of tools, analysis and comparison provides some concerning results.


My Name Is Paul

Over a number of months during the last year Jeff Harris has been conducting live research using Shodan and other tools. The results he found and the reactions he received when warning some of the organizations of his results make for interesting and in certain aspects concerning reading. Rather than break this article into two parts we think you will agree that it is better to read the whole article in one sitting.

From the Lab – The “Shattered Project”: A Forensic Understanding of Google Glass

Google Glass was first announced in April 2012 and has since been released to 8000 people to test before being released to the public. This is the first in a series of articles planned by Professor Jonathan Rajewski of Champlain College who is investigating Google Glass under the Shattered Project.



Plus all the regular features, news, Robservations, our legal section and Apple Autopsy...


Login to read online or Subscribe today!



 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Noemi Kuncik

Noemi Kuncik is an IT Forensics Specialist at Grant Thornton

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 34 on sale from February 2018:


Device Forensics in the Internet of Things

As more businesses and consumers adopt IoT devices, privacy violations and cyber-attacks by malicious actors will become commonplace due to the insecure IoT infrastructure. Read More »

Data Destruction In Current Hard Disks & Data Destruction Techniques

Data destruction is a process traditionally applied using physical techniques, aiming at the completely destruction of the hard disk, however, there is an increasing interest in the use of logical techniques for data destruction, that allow reusing the physical device. Read More »

Subscribe today


Faster Searching For Known Illegal Content

Cryptographic (“MD5”) hash searching for known illegal material is one of the most thorough methods of digital forensic investigation. However, the technique is hampered by the ever-increasing size of media being examined, and the size of the hash list being searched. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue