Logo

Forensic Analysis of Database Tampering

Small book cover: Forensic Analysis of Database Tampering

Forensic Analysis of Database Tampering
by

Publisher: University of Arizona
Number of pages: 71

Description:
This paper shows how to determine when the tampering occurred, what data was tampered, and thus perhaps ultimately who did the tampering, via forensic analysis. We present four successively more sophisticated forensic analysis algorithms: the Monochromatic, RGBY, Tiled Bitmap, and a3D Algorithms, and characterize their "forensic cost" under worst-case, best-case, and average case assumptions on the distribution of corruption sites.

Home page url

Download or read it online for free here:
Download link
(0.7MB, PDF)

Similar books

Book cover: The Open-source PKI BookThe Open-source PKI Book
by - OpenCA Team
This document describes Public Key Infrastructures, the PKIX standards, practical PKI functionality and gives an overview of available open-source PKI implementations. Its aim is foster the creation of viable open-source PKI implementations.
(5972 views)
Book cover: Cryptography and Data SecurityCryptography and Data Security
by - Addison-Wesley
The book introduces the mathematical principles of data security and shows how these principles apply to operating systems, database systems, and computer networks. It is for students and professionals seeking an introduction to these principles.
(12194 views)
Book cover: Provable Security of NetworksProvable Security of Networks
by - arXiv
We propose a definition of security and a definition of robustness of networks against the cascading failure models of deliberate attacks and random errors respectively, and investigate the principles of the security and robustness of networks.
(5563 views)
Book cover: Software Update as a Mechanism for Resilience and SecuritySoftware Update as a Mechanism for Resilience and Security
- The National Academies Press
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies.
(1646 views)