Skip to main content
  • Cover
    The Cat-Mouse Game of Digital Forensics

    Digital Forensics, Anti-Forensics, and Anti-Anti-Forensics

    (A) Digital Forensics

    Digital forensics aims to investigate various digital issues of unauthorized access, data breach, theft of intellectual property, unauthorized use of company resources, and so on.

    To achieve these aims it is necessary to preserve evidence data in original state, then to image such data for analysis and reporting in a court admissible format.

  • Cover
    How to Stop Malware Attacks on SCADA Systems

    Lessons Learned from SCADA Malware Attacks

    Stuxnet, Duqu and Flame are high-profile malware attacking industrial control systems and related supervisory control and data acquisition (SCADA) systems. From these lessons learned on how they attack and affect the systems we try to gain more understanding of SCADA cybersecurity measures.

  • Cover
    How to Handle Malicious Firmware
    Firmware modifications attack (Cui, Costello and Stolfo, 2013) was researched before. The way of a massive attack on hard disk firmwares like this scale has not been fully understood. This paper intends to explore potential ways to handle the scenario.
  • Trust No One?
    Trust No One? How Far Forrester's "Zero Trust" Model Should Go
    Trust no one, not even your end users: That's the underlying theme of a new security model proposed by Forrester Research called "Zero Trust," which calls for enterprises to inspect all network traffic, from the outside and on the inside. It means inspecting all traffic in real time. The relevant network architecture would deploy what Forrester calls a network segmentation gateway. It's like a UTM [unified threat management] tool or firewall on steroids. It's a new security paradigm, Forrester claims.
  • cyber attack
    The A to Z of Cyber Attacks
    A cyber attack adversely affects (1) information systems & their data, (2) critical infrastructure (e.g. power grid, nuclear plant, etc.), and (3) internet of things. Cybersecurity involves protecting confidentiality, availability, integrity and cyber safety of systems, data and people.