Friday, April 19, 2002

M & G - Video and Audio Communications
M & G Technology (Europe) is a leading supplier of video and audio communications products for industrial, commercial, security, law enforcement and emergency services applications.
All of our products are built to the highest quality specifications and rigorously tested in live environments before being released to our customers.
Whether you are seeking a portable monitor for completing a microwave link, a miniature transmitter for a covert video transmission or a multi-channel telemetry control panel, first seek our advice on what we have available in our wide range of equipment - or what we can design to fit any unusual requirement.
Our pages regarding selection of equipment
International Journal of Digital Evidence
International Journal of Digital Evidence (IJDE) is a forum for discussion of theory, research, policy, and practice in the rapidly changing field of digital evidence.

Sunday, April 14, 2002

Authentication Tokens: Balancing the Security Risks with Business Requirements [pdf 137k]
Stolen passwords represent a significant threat to today's enterprise. It has become apparent that a simple username and static non-changing password combination to login to a system is not adequate to protect most business information. As the corporate network is increasingly used to store disparate levels of company confidential information, there is a need for user access control.
Authentication tokens are hardware or software devices that generate dynamic one-time passwords through the use of a mathematical function. This report examines the business needs, implementation/deployment strategies, and security risk scenarios of hardware vs. software-based token technologies. No single technology will provide the ultimate solution for every situation, and there are advantages and disadvantages to the use of each type.
Trace-Back: A Concept for Tracing and Profiling Malicious Computer Attackers [pdf 109k]
In the computer security arena, every now and then, a vulnerability comes along causing a significant impact. The impact of a vulnerability is based on factors such as popularity of the vulnerable platform and the ease of exploitation of the vulnerability. Lots of research gets done on a vulnerability, beginning from its origin to the various permutations and combinations of exploit code that come out subsequently. In recent years, we have seen self-propagating exploit code (in other words, worms) becoming quite popular.
Very little is known about the events taking place in the time period between the instance that a vulnerability gets discovered by an individual or a small group of individuals, and the moment when exploit code becomes publicly available on the Internet. To zero in on the origins of a particular piece of exploit code is quite a daunting task. Very little research has been done on the subject outside of government or military organizations. Tracing back origins is a very tricky task, especially if one has to reconstruct events backwards. This paper addresses this very issue - trying to roll the film reel backwards from the time the exploit code becomes widespread in public, and filling in the blank frames to the beginning of the movie. This may not be the ultimate "big-bang" theory of the exploit universe, but it provides us with new viewpoints on exploits and their originators.
pdd: Memory Imaging and Forensic Analysis of Palm OS Devices [pdf 181k]
One goal of incident response is to preserve the entire digital crime scene with minimal or no modification of data. This paper introduces pdd or "Palm dd", a Windows-based tool for memory imaging and forensic acquisition of data from the Palm OS family of PDAs. pdd will preserve the crime scene by obtaining a bit-for-bit image or "snapshot" of the Palm device's memory contents. Such data can be used by forensic investigators, incident response teams, and criminal and civil prosecutors.
This paper also presents the Palm OS internals (hardware, file system, and debugger functionality), pdd details (usage, process, flowchart, and timing), and forensic analysis results (flash memory, record removal and deletion, retrieval of system passwords, and telephony applications).
The Importance of Application Security [pdf 109k]
The demand for digital security has never been greater in the history of the field. Unfortunately, confusion around where to start and how to manage risk is also at an all time high. This paper outlines the importance of application security and how to tell if application security should be part of your company’s digital security strategy.