dfm covers

In This Issue

Written by DFMag

Issue 17 - Out now!

Here's a quick review of some of the main articles within Issue 17

Issue 17 of Digital Forensics Magazine brings new techniques and ideas to the industry. Subscribe today to ensure you get digital access, or if you want, subscribe to the print edition. Find out more at our subscriptions pages.

Here's just a few of the fantastic articles inside Issue 17...

An Overview of Honeypots & SCADA Systems

In this article Andrew Nicholson introduces honeypots for SCADA systems and presents a short study of the current landscape of SCADA honeypots. SCADA honeypots offer an insight into the tools, techniques and procedures used by adversaries that target these systems and can help towards attribution. They also act as early warning systems, provide threat intelligence and divert attacks away from production systems.

Trustworthy Cyber Physical Systems

In this article Hugh Boyse takes a look at how given the increasing prevalence of cyber-physical systems in both the critical national infrastructure and in an emergent Internet of Things, our safety and security depends on their trustworthy operation. The combination of interconnectivity and the dynamic nature of many cyber-physical systems, presents new challenges if we are to reduce the risk of cascading or escalating failures.

Forensic Response to Cyber Terror Takedown

The realization that 99.9% of crimes now tend to have an association with some form of computing, be that, a laptop, cell phone, or other forms of communications. ‘Cyber Forensics’, and ‘First Responder Cyber Response’ are inextricably linked and John Walker considers an attack and how to respond and investigate.

Using Network Intrusion Detection Systems to Acquire Evidence

An important digital forensics process related to security hacking incidents is to collect information from log meta data that are stored in network firewalls, network intrusion detection systems (NIDS), databases, web servers and operation systems. However, the main problem with these logs is that they are designed for debugging systems and that they are often lacking capability for forensics purposes. Muteb Alqahtani & Brian Cusack investigate.

iPhone Backup Files

Part two of this article provides the readers with a realistic experience as they are taken through a hypothetical storyline that was formulated, whilst being provided with recommendations as to where specific valuable artefacts can be located and other tips to aid the forensic investigation process. It demonstrates the techniques utilized, hypotheses made and new advancements that were uncovered.

Erasure Tool Performance Can Beat the Best Intentions

Andrew Woodward and Brian Cusack take a look at how privacy protection is at risk with poor tool performance when it comes to using Secure Erasure Tools. Investigating a number of tools, analysis and comparison provides some concerning results.

My Name Is Paul

Over a number of months during the last year Jeff Harris has been conducting live research using Shodan and other tools. The results he found and the reactions he received when warning some of the organizations of his results make for interesting and in certain aspects concerning reading. Rather than break this article into two parts we think you will agree that it is better to read the whole article in one sitting.

From the Lab – The “Shattered Project”: A Forensic Understanding of Google Glass

Google Glass was first announced in April 2012 and has since been released to 8000 people to test before being released to the public. This is the first in a series of articles planned by Professor Jonathan Rajewski of Champlain College who is investigating Google Glass under the Shattered Project.

Plus all the regular features, news, Robservations, our legal section and Apple Autopsy...

Login to read online or Subscribe today!

Please make cache directory writable.

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Mark Osborne

Mark Osborne is the author of 'How To Cheat at Managing Information Security'


Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 42 on sale from February 2020:

Forensic Syntactical & Linguistic Investigation

Mark Iwazko presents a case study regarding a Forensic Syntactical & Linguistic investigation: Instructed by the Moscow General Council of one of the actual big four accountants. Read More »

Forensic Readiness: A Proactive Approach to Support Forensic Digital Analysis

An increasing number of criminal actions are inflicting financial and brand damage to organizations around the globe. An impressive number of such cases do not reach the courts, mainly because of the organization’s inefficiency to produce robust digital evidences that are acceptable in the courts of law. Read More »

Subscribe today

Using Error-Patterns for Attribution: An Applied Linguistics Technique

Corpus Linguistics within Second Language Acquisition has developed models of error patterns made by defined groups of second language learners. This knowledge base can be leveraged by a knowledgeable analyst to attribute content to a subset of authors. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue