dfm covers
 
 

In This Issue


Issue 17 - Out now!

Here's a quick review of some of the main articles within Issue 17


Issue 17 of Digital Forensics Magazine brings new techniques and ideas to the industry. Subscribe today to ensure you get digital access, or if you want, subscribe to the print edition. Find out more at our subscriptions pages.

Here's just a few of the fantastic articles inside Issue 17...


An Overview of Honeypots & SCADA Systems

In this article Andrew Nicholson introduces honeypots for SCADA systems and presents a short study of the current landscape of SCADA honeypots. SCADA honeypots offer an insight into the tools, techniques and procedures used by adversaries that target these systems and can help towards attribution. They also act as early warning systems, provide threat intelligence and divert attacks away from production systems.


Trustworthy Cyber Physical Systems

In this article Hugh Boyse takes a look at how given the increasing prevalence of cyber-physical systems in both the critical national infrastructure and in an emergent Internet of Things, our safety and security depends on their trustworthy operation. The combination of interconnectivity and the dynamic nature of many cyber-physical systems, presents new challenges if we are to reduce the risk of cascading or escalating failures.


Forensic Response to Cyber Terror Takedown

The realization that 99.9% of crimes now tend to have an association with some form of computing, be that, a laptop, cell phone, or other forms of communications. ‘Cyber Forensics’, and ‘First Responder Cyber Response’ are inextricably linked and John Walker considers an attack and how to respond and investigate.


Using Network Intrusion Detection Systems to Acquire Evidence

An important digital forensics process related to security hacking incidents is to collect information from log meta data that are stored in network firewalls, network intrusion detection systems (NIDS), databases, web servers and operation systems. However, the main problem with these logs is that they are designed for debugging systems and that they are often lacking capability for forensics purposes. Muteb Alqahtani & Brian Cusack investigate.

iPhone Backup Files

Part two of this article provides the readers with a realistic experience as they are taken through a hypothetical storyline that was formulated, whilst being provided with recommendations as to where specific valuable artefacts can be located and other tips to aid the forensic investigation process. It demonstrates the techniques utilized, hypotheses made and new advancements that were uncovered.


Erasure Tool Performance Can Beat the Best Intentions

Andrew Woodward and Brian Cusack take a look at how privacy protection is at risk with poor tool performance when it comes to using Secure Erasure Tools. Investigating a number of tools, analysis and comparison provides some concerning results.


My Name Is Paul

Over a number of months during the last year Jeff Harris has been conducting live research using Shodan and other tools. The results he found and the reactions he received when warning some of the organizations of his results make for interesting and in certain aspects concerning reading. Rather than break this article into two parts we think you will agree that it is better to read the whole article in one sitting.

From the Lab – The “Shattered Project”: A Forensic Understanding of Google Glass

Google Glass was first announced in April 2012 and has since been released to 8000 people to test before being released to the public. This is the first in a series of articles planned by Professor Jonathan Rajewski of Champlain College who is investigating Google Glass under the Shattered Project.



Plus all the regular features, news, Robservations, our legal section and Apple Autopsy...


Login to read online or Subscribe today!



 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Mark Osborne

Mark Osborne is the author of 'How To Cheat at Managing Information Security'

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 32 on sale from August 2017:


Triage Solution for Sex Offender Managers

This article considers a proof of concept triage solution for sex offender managers for a local police force which if successful could simplify and modify the way that sex offenders are managed. Read More »

Advancements in Windows Hibernation File Forensics

Brian Gerdon looks at how the windows hibernation files can be a valuable source of information for digital forensic investigators. Read More »

Subscribe today


Why Are Cybercriminals Attracted To Commit Crimes

Individuals who engage in cybercrime have a psychological mindset that is attuned to it. This paper discusses the motives behind cybercrime and what makes cybercrime attractive to cybercriminals. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue