Audit Log for Forensic Photography
نویسندگان
چکیده
We propose an architecture for an audit log system for forensic photography, which ensures that the chain of evidence of a photograph taken by a photographer at a crime scene is maintained from the point of image capture to its end application at trial. The requirements for such a system are specified and the results of experiments are presented which demonstrate the feasibility of the proposed approach.
منابع مشابه
The Impact of Dual Role of Forensic Accountant-Audit Firm's Partner on Audit Quality
Many data are effective in audit quality that are not part of the audit requirements. One of them is the personal characteristics of the auditor, such as skills and expertise. Forensic accountants have the skills need to spend on specialized fraud courses that they lack a formal non- forensic accountant. To investigate the Impact of dual role of forensic accountant- Official Accountant and audi...
متن کاملImproved event logging for security and forensics: developing audit management infrastructure requirements
The design and implementation of audit configurations is often constrained by the audit management interface, which typically models operating system structures rather than real world behavior. This paper argues for the need for improved audit management technology as part of an overall top-down approach in the establishment of IT eventlogging policies and practices. We propose that audit manag...
متن کاملCloud Computing Log Evidence Forensic Examination Analysis
Forensic analysis in the context of physical evidence is a relatively mature field. The computerization of society has led to the emergence of digital forensics and now the popularity of cloud computing has sparked interest into cloud forensics. Our goal in this paper is to enable cloud forensics, by using the theory of abstraction layers to describe the purpose and goals of virtual machine (VM...
متن کاملDesign of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is almost impossible to positively identify the application or the user behind the application that generated the traffic. Many users may have been using the networked system and there remains the possibility of network ...
متن کاملEfficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging
Due to the forensic value of audit logs, it is vital to provide compromise resiliency and append-only properties in a logging system to prevent active attackers. Unfortunately, existing symmetric secure logging schemes are not publicly verifiable and cannot address applications that require public auditing (e.g., public financial auditing), besides being vulnerable to certain attacks and depend...
متن کامل