Published Papers

There’s Nothing but Data Out There

In this article, we are going to step away from the present and try for a moment to think forward into the world of 2020, 2030 and beyond. This is a world of data. It is a world where little more...

Published on: 2012-07-24

Topic: Data

Download Paper

Live Capture Procedures

This article takes the reader through the process of carving files from a hard drive. We explore the various partition types and how to determine these (even on formatted disks), learn what the...

Published on: 2012-07-15

Topic: Digital Forensics

Download Paper

Chapter 33 - Current Issues and Liability Facing Internet Intermediaries

The Internet is formed from the interconnection of a succession of linked hosts. Originally envisaged by the United States government, the Internet was developed to offer a network solution to the...

Published on: 2012-03-06

Topic: Law

Chapter 28 - Who Pays for a Security Violation? An Assessment into the Cost of Lax Security, Negligence and Risk, a Glance into the Looking Glass

Information security is a risk function. Paying for too much security can be more economically damaging than not buying enough. This leads to the optimal expenditure on damage prevention and the...

Published on: 2012-03-06

Topic: Audit

Using Checklists to Make Better Best

The more routine a task is we see the greater the need for a checklist. Even the smartest of us can forget where we parked our cars on returning from a long flight. So, the question is, why not...

Published on: 2011-12-07

Topic: Information Security

Download Paper

Live Theater and the Limits of Human Freedom

This paper argues that there is a relationship between the structure of live theater and the question of whether human beings have free will, and that the practice of live theater and the pursuit...

Published on: 2011-09-13

Topic: Freedom

Of Black Swans, Platypii and Bunyips: The outlier and normal incident in risk management

To act rationally requires that we forecast the future with inadequate information using the past as a guide for all its flaws. We make decisions in the absence of knowledge. We state that black...

Published on: 2011-09-01

Topic: Information Security

Download Paper

A Comparative Study of Attacks Against Corporate IIS and Apache Web Servers

It has been suggested that an attacker will specifically target the Windows operating system. This research has shown that rather than this being the case an attacker will in fact not target...

Published on: 2011-08-29

Topic: Information Security

Download Paper

DPA Exploitation and GOTs With Python

This article is a follow-up and second part of a look at format strings in the C and C++ programming languages. In particular, how these may be abused. The article progresses to discuss crafting...

Published on: 2011-08-25

Topic: Developer

Download Paper

Exploiting Format Strings With Python

In this article we will look at format strings in the C and C++ programming languages. In particular, how these may be abused. The article progresses to discuss crafting attacks using python in...

Published on: 2011-08-24

Topic: Developer

Download Paper