Logo

Forensic Analysis of Database Tampering

Small book cover: Forensic Analysis of Database Tampering

Forensic Analysis of Database Tampering
by

Publisher: University of Arizona
Number of pages: 47

Description:
This paper shows how to determine when the tampering occurred, what data was tampered, and thus perhaps ultimately who did the tampering, via forensic analysis. We present four successively more sophisticated forensic analysis algorithms: the Monochromatic, RGBY, Tiled Bitmap, and a3D Algorithms, and characterize their "forensic cost" under worst-case, best-case, and average case assumptions on the distribution of corruption sites.

Download or read it online for free here:
Download link
(1.2MB, PDF)

Similar books

Book cover: Passwords: Guised Indispensable's or Liabilities?Passwords: Guised Indispensable's or Liabilities?
by
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security.
(5879 views)
Book cover: Safeguarding Your TechnologySafeguarding Your Technology
by - NCES
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.
(10291 views)
Book cover: Markets for Cybercrime Tools and Stolen Data: Hackers' BazaarMarkets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by - RAND Corporation
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report describes the fundamental characteristics of these markets.
(7657 views)
Book cover: An Introduction to Computer Security: The NIST HandbookAn Introduction to Computer Security: The NIST Handbook
by
The book provides info on securing hardware and software resources of sensitive systems, explains important concepts and interrelationships of security controls. It illustrates the major techniques for each control, and related considerations.
(19167 views)