Logo

Forensic Analysis of Database Tampering

Small book cover: Forensic Analysis of Database Tampering

Forensic Analysis of Database Tampering
by

Publisher: University of Arizona
Number of pages: 71

Description:
This paper shows how to determine when the tampering occurred, what data was tampered, and thus perhaps ultimately who did the tampering, via forensic analysis. We present four successively more sophisticated forensic analysis algorithms: the Monochromatic, RGBY, Tiled Bitmap, and a3D Algorithms, and characterize their "forensic cost" under worst-case, best-case, and average case assumptions on the distribution of corruption sites.

Home page url

Download or read it online for free here:
Download link
(0.7MB, PDF)

Similar books

Book cover: Safeguarding Your TechnologySafeguarding Your Technology
by - NCES
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.
(4079 views)
Book cover: Security ConceptsSecurity Concepts
by - subspacefield.org
This is an online book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting examples. It is not intended to be an introductory text, although a beginner could gain something from it.
(6016 views)
Book cover: Handbook of Information Security ManagementHandbook of Information Security Management
by - Auerbach Publications
This handbook provides dozens of case studies and analyzes showing you exactly how to protect systems and data using the latest tools. Learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
(7824 views)
Book cover: Fundamentals of Media SecurityFundamentals of Media Security
by - BookBoon
This introductory text covers media security, highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding.
(3966 views)