Forensic Analysis of Database Tampering
by Kyriacos E. Pavlou, Richard T. Snodgrass
Publisher: University of Arizona 2008
Number of pages: 47
Description:
This paper shows how to determine when the tampering occurred, what data was tampered, and thus perhaps ultimately who did the tampering, via forensic analysis. We present four successively more sophisticated forensic analysis algorithms: the Monochromatic, RGBY, Tiled Bitmap, and a3D Algorithms, and characterize their "forensic cost" under worst-case, best-case, and average case assumptions on the distribution of corruption sites.
Download or read it online for free here:
Download link
(1.2MB, PDF)
Similar books
Security Engineering: A Guide to Building Dependable Distributed Systems
by Ross J. Anderson, Ross Anderson - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(18993 views)
by Ross J. Anderson, Ross Anderson - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
(18993 views)
Provable Security of Networks
by Angsheng Li, Yicheng Pan, Wei Zhang - arXiv
We propose a definition of security and a definition of robustness of networks against the cascading failure models of deliberate attacks and random errors respectively, and investigate the principles of the security and robustness of networks.
(9680 views)
by Angsheng Li, Yicheng Pan, Wei Zhang - arXiv
We propose a definition of security and a definition of robustness of networks against the cascading failure models of deliberate attacks and random errors respectively, and investigate the principles of the security and robustness of networks.
(9680 views)
What If Crime Were Impossible?
by N. Richard Wagner - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(9997 views)
by N. Richard Wagner - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(9997 views)
The Protection of Information in Computer Systems
by J.H. Saltzer, M.D. Schroeder - MIT
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
(10699 views)
by J.H. Saltzer, M.D. Schroeder - MIT
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
(10699 views)