Published Papers
There’s Nothing but Data Out There
In this article, we are going to step away from the present and try for a moment to think forward into the world of 2020, 2030 and beyond. This is a world of data. It is a world where little more...
Published on: 2012-07-24
Topic: Data
Download PaperLive Capture Procedures
This article takes the reader through the process of carving files from a hard drive. We explore the various partition types and how to determine these (even on formatted disks), learn what the...
Published on: 2012-07-15
Topic: Digital Forensics
Download PaperChapter 33 - Current Issues and Liability Facing Internet Intermediaries
The Internet is formed from the interconnection of a succession of linked hosts. Originally envisaged by the United States government, the Internet was developed to offer a network solution to the...
Published on: 2012-03-06
Topic: Law
Chapter 28 - Who Pays for a Security Violation? An Assessment into the Cost of Lax Security, Negligence and Risk, a Glance into the Looking Glass
Information security is a risk function. Paying for too much security can be more economically damaging than not buying enough. This leads to the optimal expenditure on damage prevention and the...
Published on: 2012-03-06
Topic: Audit
Using Checklists to Make Better Best
The more routine a task is we see the greater the need for a checklist. Even the smartest of us can forget where we parked our cars on returning from a long flight. So, the question is, why not...
Published on: 2011-12-07
Topic: Information Security
Download PaperLive Theater and the Limits of Human Freedom
This paper argues that there is a relationship between the structure of live theater and the question of whether human beings have free will, and that the practice of live theater and the pursuit...
Published on: 2011-09-13
Topic: Freedom
Of Black Swans, Platypii and Bunyips: The outlier and normal incident in risk management
To act rationally requires that we forecast the future with inadequate information using the past as a guide for all its flaws. We make decisions in the absence of knowledge. We state that black...
Published on: 2011-09-01
Topic: Information Security
Download PaperA Comparative Study of Attacks Against Corporate IIS and Apache Web Servers
It has been suggested that an attacker will specifically target the Windows operating system. This research has shown that rather than this being the case an attacker will in fact not target...
Published on: 2011-08-29
Topic: Information Security
Download PaperDPA Exploitation and GOTs With Python
This article is a follow-up and second part of a look at format strings in the C and C++ programming languages. In particular, how these may be abused. The article progresses to discuss crafting...
Published on: 2011-08-25
Topic: Developer
Download PaperExploiting Format Strings With Python
In this article we will look at format strings in the C and C++ programming languages. In particular, how these may be abused. The article progresses to discuss crafting attacks using python in...
Published on: 2011-08-24
Topic: Developer
Download Paper