
Forensic Analysis of Database Tampering
by Kyriacos E. Pavlou, Richard T. Snodgrass
Publisher: University of Arizona 2008
Number of pages: 47
Description:
This paper shows how to determine when the tampering occurred, what data was tampered, and thus perhaps ultimately who did the tampering, via forensic analysis. We present four successively more sophisticated forensic analysis algorithms: the Monochromatic, RGBY, Tiled Bitmap, and a3D Algorithms, and characterize their "forensic cost" under worst-case, best-case, and average case assumptions on the distribution of corruption sites.
Download or read it online for free here:
Download link
(1.2MB, PDF)
Similar books
Security Engineering: A Guide to Building Dependable Distributed Systemsby Ross J. Anderson, Ross Anderson - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(20936 views)
Good Digital Hygiene: A guide to staying secure in cyberspaceby Ed Gelbstein - Bookboon
The explosive growth in the adoption of electronic devices by the general population is creating and environment where some measures of digital hygiene are needed to protect the devices and the data they contain as well as their owners.
(11675 views)
IT Security Cookbookby Sean Boran - Boran Consulting
This document defines a security policy, outlines structure of a security organization, presents current security mechanisms, and provides technical guidelines for operating systems, applications and networks used in client/server systems.
(18231 views)
The Open-source PKI Bookby Symeon Xenitellis - OpenCA Team
This document describes Public Key Infrastructures, the PKIX standards, practical PKI functionality and gives an overview of available open-source PKI implementations. Its aim is foster the creation of viable open-source PKI implementations.
(12597 views)