The Utility of Inconsistency in Information Security and Digital Forensics
نویسنده
چکیده
Inconsistency in knowledge, information and data is ubiquitous. Inconsistency can be used as a very effective tool in accomplishing the objectives in information security and digital forensics. In this paper, our focus is on the utilities of inconsistency in those areas: access control lists in firewalls, intrusion detection systems, operating system access control mechanisms, deception based defense, and digital image forensics. We describe an algorithm for detecting several types of firewall rule inconsistency. Compared with related work, our approach has several salient features. We also define a special type of inconsistency called setuid inconsistency and highlight various other types of inconsistencies in the aforementioned areas. The takehome message is that inconsistency is a very important phenomenon and its utilities can never be underestimated in information security and digital forensics.
منابع مشابه
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملtransaction cost and Time inconsistency in consumption- Savings behavior(experimental approach)
Empirical and experimental studies demonstrate that the rates of time preferences are smaller in long run in comparison with that of short run. In other word individuals are present bias; and it is one of the reasons that the saving is less than its optimal level. The aim of this study is to examine if the dearth of sufficient information results in time inconsistency in individual decisions fo...
متن کاملDigital Forensics: Emerging Trends and Analysis of Counter-Security Environment
Corporates and organizations across the globe are spending huge sums on information security as they are reporting an increase in security related incidents. The proliferation of cloud, social network and multiple mobile device usage is on one side represent an opportunity and benefits to the organisation and on other side have posed new challenges for those policing cybercrimes. Cybercriminals...
متن کاملPrivacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology
Owing to a number of reasons, the deployment of encryption solutions are beginning to be ubiquitous at both organizational and individual levels. The most emphasized reason is the necessity to ensure confidentiality of privileged information. Unfortunately, it is also popular as cyber-criminals' escape route from the grasp of digital forensic investigations. The direct encryption of data or ind...
متن کاملEffective Digital Forensics Research Is Investigator-Centric
Many technical mechanisms across computer security for attribution, identification, and classification are neither sufficient nor necessary for forensically valid digital investigations; yet they are often claimed as useful or necessary. Similarly, when forensic research is evaluated using the viewpoints held by computer security venues, the challenges, constraints, and usefulness of the work i...
متن کامل