This article discusses the security issues of custom application development.
Digital forensics and the issues of identity
β Scribed by Andy Jones; T. Martin
- Publisher
- Elsevier Science
- Year
- 2010
- Tongue
- English
- Weight
- 123 KB
- Volume
- 15
- Category
- Article
- ISSN
- 1363-4127
No coin nor oath required. For personal study only.
β¦ Synopsis
The issue of what we consider to be the identity of a person has become increasingly complex as we have made ever greater use of the facilities and services that have been made available by developing technologies and the Internet. In the past people normally had one identity, while in the current environment it is acceptable to maintain separate 'identities' for different aspects of our on-line interactions.
Proving beyond a reasonable doubt that an individual that is suspected of a crime that is based on the technologies that we increasingly rely on was the actual perpetrator has always been problematic. It is relatively easy to determine the device that was used, but proving that the suspect was the person that used it has always been more difficult.
This paper looks at a range of issues that have affected what we consider to be reasonable proof of identity and a number of the problems that this causes in identifying the perpetrator of a crime.
π SIMILAR VOLUMES
Data residing in the RAM, system, or internal/external peripheral memory. According to RFC 3227 (a master document issued by the Internet Engineering Task Force), these are the first data that should be acquired during a forensic investigation. 1 β’ Data at rest: Data in the file system. This article
Vargas and Fallon (2005. J Exp Zool (Mol Dev Evol) 304B:86-90) propose that Hox gene expression patterns indicate that the most anterior digit in bird wings is homologous to digit 1 rather than to digit 2 in other amniotes. This interpretation is based on the presence of Hoxd13 expression in combina