Forensic Analysis of Database Tampering
by Kyriacos E. Pavlou, Richard T. Snodgrass
Publisher: University of Arizona 2008
Number of pages: 47
Description:
This paper shows how to determine when the tampering occurred, what data was tampered, and thus perhaps ultimately who did the tampering, via forensic analysis. We present four successively more sophisticated forensic analysis algorithms: the Monochromatic, RGBY, Tiled Bitmap, and a3D Algorithms, and characterize their "forensic cost" under worst-case, best-case, and average case assumptions on the distribution of corruption sites.
Download or read it online for free here:
Download link
(1.2MB, PDF)
Similar books
Safeguarding Your Technology
by Tom Szuba - NCES
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.
(10913 views)
by Tom Szuba - NCES
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.
(10913 views)
Rethinking Public Key Infrastructures and Digital Certificates
by Stefan A. Brands - The MIT Press
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
(12138 views)
by Stefan A. Brands - The MIT Press
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
(12138 views)
Cryptography and Security in Computing
by Jaydip Sen (ed.) - InTech
The purpose of this book is to present some of the security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defense mechanisms.
(20836 views)
by Jaydip Sen (ed.) - InTech
The purpose of this book is to present some of the security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defense mechanisms.
(20836 views)
A Guide to Claims-Based Identity and Access Control
by Dominick Baier, at al. - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(13268 views)
by Dominick Baier, at al. - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(13268 views)