Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2013

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 241 - 270 of 11461

Full-Text Articles in Physical Sciences and Mathematics

Is Emergency Management Considered A Component Of Business Continuity Management?, Kenny Frohde, David J. Brooks Dec 2013

Is Emergency Management Considered A Component Of Business Continuity Management?, Kenny Frohde, David J. Brooks

Australian Security and Intelligence Conference

Emergency Management (EM) and Business Continuity Management (BCM) frameworks incorporate measures of strategic and operational aspects. Defined within a number of Australian and international standards as well as guidelines, such concepts may be integrated to provide increased resilience for disruptive events. However, it has been found that there is some degree of misalignment of concept integration amongst security and EM bodies of knowledge. In line with cognitive psychology exemplar‐based concepts, such misalignments may be associated with a lack of precision in communality in the approach to EM and BCM. This article presents stage 1 of a two‐stage study. Stage 1 …


A Conceptual Model For Federated Authentication In The Cloud, Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, Ingo Stengel Dec 2013

A Conceptual Model For Federated Authentication In The Cloud, Abdulwahid Al Abdulwahid, Nathan Clarke, Steven Furnell, Ingo Stengel

Australian Information Security Management Conference

Authentication is a key security control for any computing system, whether that is a PC, server, laptop, tablet or mobile phone. However, authentication is traditionally poorly served, with existing implementations falling foul of a variety of weaknesses. Passwords are poorly selected, reused and shared (to name but a few). Research has suggested novel approaches to authentication such as transparent authentication and cooperative and distributed authentication. However, these technologies merely focus upon individual platforms rather than providing a universal and federated authentication approach that can be used across technologies and services. The advent of cloud computing, its universal connectivity, scalability and …


A Comparison Of Information Security Curricula In China And The Usa, Huaying Chen, Sean B. Maynard, Atif Ahmad Dec 2013

A Comparison Of Information Security Curricula In China And The Usa, Huaying Chen, Sean B. Maynard, Atif Ahmad

Australian Information Security Management Conference

Information Security (InfoSec) education varies in its content, focus and level of technicality across the world. In this paper we investigate the differences between graduate InfoSec programs in top universities in China and in the United States of America (USA). In China, curriculum emphasises Telecommunication, Computer Science and InfoSec Technology, whilst in the USA in addition to Computer Science and InfoSec Technology the curriculum also emphasises Enterprise‐level Security Strategy and Policy, InfoSec Management, and Cyber Law. The differences are significant and will have a profound impact on both the perceptions and capabilities of future generations of information security professionals on …


The Effectiveness Of Internet Activity Erasure Tools To Protect Privacy, Brian Cusack, Andrew Woodward, Scott Butson, Benjamin Leber Dec 2013

The Effectiveness Of Internet Activity Erasure Tools To Protect Privacy, Brian Cusack, Andrew Woodward, Scott Butson, Benjamin Leber

Australian Information Security Management Conference

When most people go to the trouble of getting erasure tools to remove data from their hard drives they expect the job is done correctly. Using erasure tools is a step to protect privacy by assuming the applied tools erase data rather than simply delete data that may be recovered using forensic tools. In this research we tested the performance of the delete function on three web browsers against the performance of eight erasure tools with alarming results. It was found that the erasure tools had almost the same capability to delete data as the web browsers delete function; and …


A 2013 Study Of Wireless Network Security In New Zealand: Are We There Yet?, Alastair Nisbet Dec 2013

A 2013 Study Of Wireless Network Security In New Zealand: Are We There Yet?, Alastair Nisbet

Australian Information Security Management Conference

This research examines the current level of security in wireless networks in New Zealand. A comprehensive wardrive covering the length of the country was made in January 2013 to ensure accurate comparisons from two previous wardrives as well as comparisons between the four main cities and the suburbs can be made. With 16 years since the introduction of the original IEEE 802.11 wireless standard having passed, an examination is made of the current state of wireless security of networks throughout New Zealand and the Auckland suburbs, and where possible compares these results with similar studies undertaken in 2004 and 2011. …


Marine Diatom Assemblage Variation Across Pleistocene Glacial-Interglacial Transitions And Neogene Diatom Biostratigraphy Of Site C9001, Nw Pacific Ocean, Marcella K. Purkey Dec 2013

Marine Diatom Assemblage Variation Across Pleistocene Glacial-Interglacial Transitions And Neogene Diatom Biostratigraphy Of Site C9001, Nw Pacific Ocean, Marcella K. Purkey

Department of Earth and Atmospheric Sciences: Dissertations, Theses, and Student Research

In 2006, D/V-Chikyu cruise CK06-06 drilled Hole C9001C at Site C9001 in the Northwest Pacific Ocean, 80 km east of the Shimokita Peninsula, Japan. An existing chronostratigraphic framework provides a continuous glacial-interglacial (GI) climate record from which a diatom record of paleoenvironmental changes was developed across several GI cycles. Species counts, diatom temperature values, calculated sea-surface temperatures (SST) and factor analysis were produced for each sample and calibrated to prior diatom studies in this region. These features were used to characterize and compare interglacial maxima of Marine Isotope Stages (MIS) 1, 5e, 9 and 11 and transitions from the preceding …


Privacy And Legal Issues In Cloud Computing - The Smme Position In South Africa, Mathias Mujinga Dec 2013

Privacy And Legal Issues In Cloud Computing - The Smme Position In South Africa, Mathias Mujinga

Australian Information Security Management Conference

Cloud computing (CC) brings substantial benefits to organizations and their clients. Information technology (IT) users in developing countries, especially those in underdeveloped communities, are gaining easy and cost‐effective access to a variety of services, from entertainment to banking. South Africa has outlined a national e‐strategy that aims to improve those communities, by providing frameworks for access to information and communications technology (ICT). The products and services of small‐, medium and micro‐sized enterprises (SMME) are now reaching a wider audience through the use of technology. CC can go a long way to help government realize the national e‐strategy. There are numerous …


Determining What Characteristics Constitute A Darknet, Symon Aked, Christopher Bolan, Murray Brand Dec 2013

Determining What Characteristics Constitute A Darknet, Symon Aked, Christopher Bolan, Murray Brand

Australian Information Security Management Conference

Privacy on the Internet has always been a concern, but monitoring of content by both private corporations and Government departments has pushed people to search for ways to communicate over the Internet in a more secure manner. This has given rise to the creations of Darknets, which are networks that operate “inside” the Internet, and allow anonymous participation via a de‐centralised, encrypted, peer‐to‐peer network topology. This research investigates some sources of known Internet content monitoring, and how they provided the template for the creation of a system to avoid such surveillance. It then highlights how communications on the Clearnet is …


3d Visual Method Of Variant Logic Construction For Random Sequence, Huan Wang, Jeffrey Zheng Dec 2013

3d Visual Method Of Variant Logic Construction For Random Sequence, Huan Wang, Jeffrey Zheng

Australian Information Warfare and Security Conference

As Internet security threats continue to evolve, in order to ensure information transmission security, various encrypt and decrypt has been used in channel coding and decoding of data communication. While cryptography requires a very high degree of apparent randomness, Random sequences play an important role in cryptography. Both CA (Cellular Automata) and RC4 contain pseudo‐random number generators and may have intrinsic properties respectively. In this paper, a 3D visualization model (3DVM) is proposed to display spatial characteristics of the random sequences from CA or RC4 keystream. Key components of this model and core mechanism are described. Every module and their …


The Influence And Deception Of Twitter: The Authenticity Of The Narrative And Slacktivism In The Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, David M. Cook Dec 2013

The Influence And Deception Of Twitter: The Authenticity Of The Narrative And Slacktivism In The Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, David M. Cook

Australian Information Warfare and Security Conference

It is uncertain how many discreet users occupy the social media community. Fake tweets, sock puppets, force‐multipliers and botnets have become embedded within the fabric of new media in sufficient numbers that social media support by means of quantity is no longer a reliable metric for determining authority and influence within openly expressed issues and causes. Election campaigns, and their associated political agendas, can now be influenced by non‐specific virtual presences that cajole and redirect opinions without declaring identity or allegiance. In the lead up to the 2013 Australian Federal Election, the open source Twitter activity for the two major …


Complementary Feature Level Data Fusion For Biometric Authentication Using Neural Networks, Mark Abernethy, Shri Rai Dec 2013

Complementary Feature Level Data Fusion For Biometric Authentication Using Neural Networks, Mark Abernethy, Shri Rai

Australian Information Warfare and Security Conference

Data fusion as a formal research area is referred to as multi‐sensor data fusion. The premise is that combined data from multiple sources can provide more meaningful, accurate and reliable information than that provided by data from a single source. There are many application areas in military and security as well as civilian domains. Multi‐sensor data fusion as applied to biometric authentication is termed multi‐modal biometrics. Though based on similar premises, and having many similarities to formal data fusion, multi‐modal biometrics has some differences in relation to data fusion levels. The objective of the current study was to apply feature …


Towards Detection And Control Of Civilian Unmanned Aerial Vehicles, Matthew Peacock, Michael N. Johnstone Dec 2013

Towards Detection And Control Of Civilian Unmanned Aerial Vehicles, Matthew Peacock, Michael N. Johnstone

Australian Information Warfare and Security Conference

Considering the significant number of non‐military unmanned aerial vehicles (UAVs) that can be purchased to operate in unregulated air space and the range of such devices, the potential for security and privacy problems to arise is significant. This can lead to consequent harm for critical infrastructure in the event of these UAVs being used for criminal or terrorist purposes. Further, if these devices are not being detected, there is a privacy problem to be addressed as well. In this paper we test a specific UAV, the Parrot AR Drone version 2, and present a forensic analysis of tests used to …


A Study On Information Induced Medication Errors, Rebecca Hermon, Patricia A.H. Williams Dec 2013

A Study On Information Induced Medication Errors, Rebecca Hermon, Patricia A.H. Williams

Australian eHealth Informatics and Security Conference

Preventable medical adverse events are a serious concern for healthcare. Medication errors form a significant part of these concerns and it is evident that these errors can have serious consequences such as death or disability. Many medication errors are a consequence of information failure. Therefore to prevent such adverse events, the associated information flow must be understood. This research used a systematic review methodology to conduct an analysis of medication error as a result of information failure. Its aim was to suggest solutions on reducing information induced medication errors. The results indicate that is apparent that human error such as …


Forensic Memory Dump Analysis And Recovery Of The Artefacts Of Using Tor Bundle Browser – The Need, Divya Dayalamurthy Dec 2013

Forensic Memory Dump Analysis And Recovery Of The Artefacts Of Using Tor Bundle Browser – The Need, Divya Dayalamurthy

Australian Digital Forensics Conference

The Onion Routing (TOR) project is a network of virtual tunnels that facilitates secure, private communications on the internet. A recent article published in “The Registry” claims that TOR bundle browser usage has increased in recent years; statistics show that in January 2012, there were approximately 950,000 users globally and now in August 2013 that figure is estimated to have reached 1,200,000 users. The report also illustrates that The United states of America and the United Kingdom are major contributors towards the massive increase in TOR usage. Similarly, other countries like India and Brazil have increased usage to 32,000 and …


Towards An Automated Forensic Examiner (Afe) Based Upon Criminal Profiling & Artificial Intelligence, M Al Fahdi, N L. Clarke, S M. Furnell Dec 2013

Towards An Automated Forensic Examiner (Afe) Based Upon Criminal Profiling & Artificial Intelligence, M Al Fahdi, N L. Clarke, S M. Furnell

Australian Digital Forensics Conference

Digital forensics plays an increasingly important role within society as the approach to the identification of criminal and cybercriminal activities. It is however widely known that a combination of the time taken to undertake a forensic investigation, the volume of data to be analysed and the number of cases to be processed are all significantly increasing resulting in an ever growing backlog of investigations and mounting costs. Automation approaches have already been widely adopted within digital forensic processes to speed up the identification of relevant evidence – hashing for notable files, file signature analysis and data carving to name a …


Acquisition Of Evidence From Network Intrusion Detection Systems, Brian Cusack, Muteb Alqahtani Dec 2013

Acquisition Of Evidence From Network Intrusion Detection Systems, Brian Cusack, Muteb Alqahtani

Australian Digital Forensics Conference

The literature reviewed suggests that Network Intrusion Systems (NIDS) are valuable tools for the detection of malicious behaviour in network environments. NIDS provide alerts and the trigger for rapid responses to attacks. Our previous research had shown that NIDS performance in wireless networks had a wide variation under different workloads. In this research we chose wired networks and asked the question: What is the evidential value of NIDS? Three different NIDS were tested under two different attacks and with six different packet rates. The results were alarming. As the work loading increased the NIDS detection capability fell rapidly and as …


A Rapidly Moving Target: Conformance With E-Health Standards For Mobile Computing, Patricia A.H. Williams, Vincent B. Mccauley Dec 2013

A Rapidly Moving Target: Conformance With E-Health Standards For Mobile Computing, Patricia A.H. Williams, Vincent B. Mccauley

Australian eHealth Informatics and Security Conference

The rapid adoption and evolution of mobile applications in health is posing significant challenges in terms of standards development, standards adoption, patient safety, and patient privacy. This is a complex continuum to navigate. There are many competing demands from the standards development process, to the use by clinicians and patients. In between there are compliance and conformance measures to be defined to ensure patient safety, effective use with integration into clinical workflow, and the protection of data and patient privacy involved in data collection and exchange. The result is a composite and intricate mixture of stakeholders, legislation, and policy together …


A Privacy-Preserving Framework For Personally Controlled Electronic Health Record (Pcehr) System, Mahmuda Begum, Quazi Mamun, Mohammed Kaosar Dec 2013

A Privacy-Preserving Framework For Personally Controlled Electronic Health Record (Pcehr) System, Mahmuda Begum, Quazi Mamun, Mohammed Kaosar

Australian eHealth Informatics and Security Conference

The electronic health record (eHR) system has recently been considered one of the biggest advancements in healthcare services. A personally controlled electronic health record (PCEHR) system is proposed by the Australian government to make the health system more agile, secure, and sustainable. Although the PCEHR system claims the electronic health records can be controlled by the patients, healthcare professionals and database/system operators may assist in disclosing the patients’ eHRs for retaliation or other ill purposes. As the conventional methods for preserving the privacy of eHRs solely trust the system operators, these data are vulnerable to be exploited by the authorised …


Developing A Mobile Audiometric Sound Booth Application For Apple Ios Devices, Luke J. Brook, Patricia A.H. Williams Dec 2013

Developing A Mobile Audiometric Sound Booth Application For Apple Ios Devices, Luke J. Brook, Patricia A.H. Williams

Australian eHealth Informatics and Security Conference

Hearing loss in Australian children, particularly those in rural and remote areas, is a growing health concern. Resultant deafness has significant impact on the educational and social development of such children. Whilst telehealth had provided other benefits for rural and remote areas, the absence of suitable testing equipment and associated healthcare specialists has meant that there is a gap in this area of child health that could be addressed using a mobile solution. This paper discusses the research and development of a mobile application for testing and diagnosis of hearing loss in children. It is unique in its ability to …


Ehealth Security Australia: The Solution Lies With Frameworks And Standards, Bryan Foster, Yvette Lejins Dec 2013

Ehealth Security Australia: The Solution Lies With Frameworks And Standards, Bryan Foster, Yvette Lejins

Australian eHealth Informatics and Security Conference

Security is a key foundation for eHealth in Australia, driving benefits in healthcare quality, safety, and efficiency towards improved health outcomes for all Australians. To this end, the National eHealth Transition Authority (NEHTA), the Royal Australian College of General Practitioners (RACGP), and Standards Australia have each produced security-related publications to assist Australian healthcare organisations protect their data. These publications provide standards, tools, and guides for the healthcare industry to build and implement secure systems that protect patient data and eHealth-related assets, while providing the provenance required to help ensure patient safety and privacy. This paper outlines some of the current …


The Applicability Of Iso/Iec27014:2013 For Use Within General Medical Practice, Rachel J. Mahncke Dec 2013

The Applicability Of Iso/Iec27014:2013 For Use Within General Medical Practice, Rachel J. Mahncke

Australian eHealth Informatics and Security Conference

General practices are increasingly cognizant of their responsibilities in regards to information security, as is evidenced by professional bodies such as the Royal Australian College of General Practitioners (RACGP) who publish the Computer and Information Security Standards (CISS) for General Practices. Information security governance in general medical practice is an emerging area of importance. As such, the CISS (2013) standard incorporates elements of information security governance. The International Organization for Standardization (ISO) released a new global standard in May 2013 entitled, ISO/IEC 27014:2013 Information technology -- Security techniques -- Governance of information security. The release of this revised ISO standard, …


Cartoons For E-Health Informatics, Moira Sim, Eric Khong, Ashleigh Mcevoy, Toni Wain, Mick Sim, Patricia A.H. Williams Dec 2013

Cartoons For E-Health Informatics, Moira Sim, Eric Khong, Ashleigh Mcevoy, Toni Wain, Mick Sim, Patricia A.H. Williams

Australian eHealth Informatics and Security Conference

Not only is Hepatitis B serology often misunderstood because of its complex serological implications, but advances in medical science have revolutionised screening and treatment of hepatitis B. To maximise such evolution however, this new information must be relayed effectively and efficiently to current and future medical professionals. Cartoons have been well regarded as a teaching tool in a variety of different settings as is the use of web based technology. Therefore the delivery of a cartoon based learning tool, accessed via on-line learning modules was considered a novel and potentially effective way of disseminating new knowledge. To increase health professionals’ …


The Syrian Calling: Western Jihad Recruitment And Martyrdom, Robyn Torok Dec 2013

The Syrian Calling: Western Jihad Recruitment And Martyrdom, Robyn Torok

Australian Counter Terrorism Conference

The crisis in Syria has attracted worldwide attention as well as condemnation and has degraded into a violent civil conflict. Not only are there more than a thousand rebel groups including a number of hard‐line jihadist groups operating within Syria, but these jihadist groups are attracting a significant number of foreigners including Australians. This study examined social media discourses from Facebook and embedded YouTube links for recruiting Westerners to the war in Syria. Findings suggest that the perceived inaction of the international community and in particular the West coupled with the atrocities committed has become a platform for jihadi recruitment. …


Verification Of Primitive Sub Ghz Rf Replay Attack Techniques Based On Visual Signal Analysis, Maxim Chernyshev Dec 2013

Verification Of Primitive Sub Ghz Rf Replay Attack Techniques Based On Visual Signal Analysis, Maxim Chernyshev

Australian Digital Forensics Conference

As the low cost options for radio traffic capture, analysis and transmission are becoming available, some security researchers have developed open source tools that potentially make it easier to assess the security of the devices that rely on radio communications without the need for extensive knowledge and understanding of the associated concepts. Recent research in this area suggests that primitive visual analysis techniques may be applied to decode selected radio signals successfully. This study builds upon the previous research in the area of sub GHz radio communications and aims to outline the associated methodology as well as verify some of …


Steganographic Checks In Digital Forensic Investigation: A Social Networking Case, Brian Cusack, Aimie Chee Dec 2013

Steganographic Checks In Digital Forensic Investigation: A Social Networking Case, Brian Cusack, Aimie Chee

Australian Digital Forensics Conference

Steganography is an ancient art that has received a mega boost in the digital age. Electronic communications are easily accessible by most people and have a wide range of opportunities to embed secret messages in a diverse range of cover objects. Our research questions were: What can an investigator do to check for hidden messages in social media? And, how much searching is enough? The testing was conducted in replicated social networking sites and digital images were selected as the cover objects. The research findings showed that steganography is as easy as sending an email and not much more difficult …


A Forensic Analysis And Comparison Of Solid State Drive Data Retention With Trim Enabled File Systems, Alastair Nisbet, Scott Lawrence, Matthew Ruff Dec 2013

A Forensic Analysis And Comparison Of Solid State Drive Data Retention With Trim Enabled File Systems, Alastair Nisbet, Scott Lawrence, Matthew Ruff

Australian Digital Forensics Conference

Solid State Drives offer significant advantages over traditional hard disk drives. No moving parts, superior resistance to shock, reduced heat generation and increased battery life for laptops. However, they are susceptible to cell failure within the chips. To counter this, wear levelling is used so that cells are utilised for data at approximately the same rate. An improvement to the original wear levelling routine is TRIM, which further enhances the lifetime of the cells by allowing the garbage collection process as one operation rather than an on going process. The advantages of TRIM for the user is that it increases …


An Investigation Into The Efficiency Of Forensic Data Erasure Tools For Removable Usb Flash Memory Storage Devices, Krishnun Sansurooah, Haydon Hope, Hani Almutairi, Fayadh Alnazawi, Yunhan Jiang Dec 2013

An Investigation Into The Efficiency Of Forensic Data Erasure Tools For Removable Usb Flash Memory Storage Devices, Krishnun Sansurooah, Haydon Hope, Hani Almutairi, Fayadh Alnazawi, Yunhan Jiang

Australian Digital Forensics Conference

Securely erasing data is of key importance to anyone that is concerned with the security of their sensitive information, whether an individual or an organization. Simply deleting the data in question or formatting the storage device is not enough to ensure that the data cannot be recovered. Furthermore, with the uptake of Universal Serial Bus drives (USBs) flash memory based storage devices have replaced previous portable secondary storage media. Therefore, it is of a major concern whether these tools and products developed for securely erasing data secondary storage Hard Disk Drives (HDDs) would be as efficient when targeting the USB …


Information Security Management: Factors That Influence Security Investments In Smes, Zhi Xian Ng, Atif Ahmad, Sean B. Maynard Dec 2013

Information Security Management: Factors That Influence Security Investments In Smes, Zhi Xian Ng, Atif Ahmad, Sean B. Maynard

Australian Information Security Management Conference

In the modern information economy, the security of information is critically important to organizations. Information‐security risk assessments (ISRAs) allow organizations to identify key information assets and security risks so security expenditure can be directed cost‐effectively. Unfortunately conducting ISRAs requires special expertise and tends to be complex and costly for small to medium sized organizations (SMEs). Therefore, it remains unclear in practice, and unknown in literature, how SMEs address information security imperatives without the benefit of an ISRA process. This research makes a contribution to theory in security management by identifying the factors that influence key decision-makers in SMEs to address …


Usability And Security Support Offered Through Adsl Router User Manuals, Patryk Szewczyk Dec 2013

Usability And Security Support Offered Through Adsl Router User Manuals, Patryk Szewczyk

Australian Information Security Management Conference

ADSL routers are often used as either the target or the means for cyber crime. Many ADSL router threats could be mitigated through the effective use of inbuilt security controls and firmware updates available from vendors. Unfortunately, end‐users typically lack the technical expertise to correctly configure and secure the device. Subsequently, end‐users are reliant on well documented procedures provided by vendors in their user manuals and quick start guides. This study investigates the usability and security recommendations and encouragements put forth by vendors in their user manuals. The study demonstrates that user manual usability does not conform to ideal technical …


Volatile Memory Acquisition Tools – A Comparison Across Taint And Correctness, William Campbell Dec 2013

Volatile Memory Acquisition Tools – A Comparison Across Taint And Correctness, William Campbell

Australian Digital Forensics Conference

The growth in volatile memory forensics has steadily increased in recent times. With this growth comes a need to test the tools associated with this practise. Although there appears to be a large amount of effort in testing static memory capture tools, there is perhaps less so for volatile memory capture. This paper describes the attempts at categorizing criteria for testing, and then introduces and extends upon a methodology proposed by Lempereur and colleagues in 2012. Four tools (Windows Memory Reader, WinPmem, FTK Imager and DumpIt) are tested against two criteria (impact and completeness). WMR and DumpIt were found to …