Difference between pages "User:Helixgroup" and "Websites"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Suggestion of outline :)
 
m
 
Line 1: Line 1:
''The danger in using a wiki as a collaboration tool is that other people will edit it.  
+
'''Websites''' about [[digital forensics]] and related topics.
  
Information on cryptographic file system was moved to [[File Systems#Cryptographic File Systems]]
+
= Digital Forensics =
  
 +
* [http://digitalforensics.ch/ Bruce Nikkel's Computer Forensics Homepage]
  
 +
* [http://www.lnx4n6.be/ The Belgian Computer Forensic Website] - Linux oriented.
 +
* [http://www.dfrws.org/ Official Website for Digital Forensic Research Workshop] - Open forum for research in digital forensic issues, hosting annual meeting and annual forensics challenge.
 +
* [http://certified-computer-examiner.com/ Certfied Computer Examiner Website] - Open certification process for digital forensics.
 +
* [http://www.iacis.info/ International Association of Computer Investigative Specialists] - Volunteer non-profit corporation composed of law enforcement professionals.
 +
* [[Cyberspeak podcast]] - Computer forensics, network security, and computer crime podcast.
 +
* [http://128.175.24.251/forensics/default.htm University of Delaware] Computer Forensics Lab Resource Site.
  
=== Vendor's product overview: ===
+
= Non-Digital Forensics =
Seagate FDE: http://www.seagate.com/docs/pdf/marketing/PO-Momentus-FDE.pdf
+
  
Network Appliance: http://www.netapp.com/ftp/decru-fileshredding.pdf
+
* [http://fingerprint.nist.gov/ NIST Image Group] - Many reports, including the [[NIST]] report on [[AFIS]] [[fingerprint]] testing.
 
+
NetApps DataFort: http://www.decru.com/products/pdf/dsEseries.pdf
+
 
+
Decru Lifetime Key Management: http://www.decru.com/products/ltkm.htm
+
 
+
Decru Whitepaper: http://www.forensicswiki.org/images/6/6f/Securing_Storage_White_Paper.pdf
+
 
+
Price for Decru DataFort E510 1.6 for NAS: http://infosecuritymag.techtarget.com/ss/0,295796,sid6_iss346_art680,00.html
+
 
+
DecruDataFort E440: http://www.computerworld.com/hardwaretopics/storage/story/0,10801,78766,00.html
+
 
+
[[User:Lenageraghty|Lenageraghty]] 22:08, 7 November 2005 (EST)
+
 
+
=== SAM Useful TCFS site: ===
+
 
+
Transparent CryptoGraphical file system: http://www.tcfs.it/index.php?pc=2
+
 
+
TCFS intro: http://www.linuxjournal.com/article/2174
+
 
+
--[[User:Samlam|Samlam]] 19:56, 13 November 2005 (EST)
+
 
+
=== ERIC Seagate new offerings: ===
+
Full Disk Encryption: http://www.eweek.com/article2/0,1759,1825740,00.asp
+
 
+
Seagate product specification: http://www.seagate.com/content/docs/pdf/marketing/PO-Momentus-FDE.pdf
+
 
+
 
+
[[User:Samlam|Samlam]] 12:10, 13 November 2005 (EST)
+
 
+
=== Cryptographcial File Systems: ===
+
[[File Systems#Cryptographic File Systems]] Readings on crytographical file systems.
+
=== Some Questions / Notes from BJ===
+
I added to the existing outline below.  We only get 15 pages max, so we might have to limit ourselves to 2 pages (3 tops) per EFS, so there might be too many items for each EFS listed, but I think it would be good for us to be consistent and have the same items in each EFS.
+
 
+
I think we should start filling out what we can in the outline during this week, so that we can "refine as we go". 
+
 
+
Please make sure and add your citations, also.  Do not worry about format; we will do that later; but make sure all the information is there.
+
 
+
=== Suggestion of outline : ===
+
*Introduction (BJ)
+
**Definition of an Encrypting File System
+
**Purpose/Goal of an EFS
+
***Purpose: to add an additional layer of security, controlled by the user, over that user's data
+
***Goal: to allow users to feel confident the data placed in the EFS cannot be compromised.
+
**Overview of General Workings
+
***(description of common functionality and common processes to all or most EFS)
+
***You have data in memory, you want to save it to disk, you only want "authorized" people to see it; not even system administrators and/or backup operators
+
***You control access by "owning" the key
+
***Key is generated (somehow)
+
***There is overhead in the process of encrypting/decrypting (unavoidable)
+
**Overview of Common Usage
+
***Maybe some categories of users and what they are looking for:
+
***"business critical applications" like databases, etc. where business relies on data being available and secure
+
***"business users" like managers who want to secure employee reviews, HR people wanting to secure salary information, etc.
+
***"casual users" people who just want to make sure their data is secure.
+
**The currently available systems (market share?)
+
**Why we choose CFS TCFS and Network Applicances
+
*Study of 4 systems in depth, including why this system is selected for study.
+
**CFS (LENA)
+
***Overview
+
****When Developed
+
****Platform(s)
+
****Current Version
+
***Key Management
+
***Ease of Use for End Users
+
***Legal Issues
+
***Failure Modes
+
***Challenges in Installation/Use by System Administrator
+
***Performance
+
***Cost
+
***Conclusion (?? what would that be??)
+
**TCFS (SAM)
+
***Overview
+
****When Developed
+
****Platform(s)
+
****Current Version
+
***Key Management
+
***Ease of Use for End Users
+
***Legal Issues
+
***Failure Modes
+
***Challenges in Installation/Use by System Administrator
+
***Performance
+
***Cost
+
***Conclusion (?? what would that be??)
+
**Network Appliance DataForte and Seagate (ERIC)
+
***Overview
+
****When Developed
+
****Platform(s)
+
****Current Version
+
***Key Management
+
***Ease of Use for End Users
+
***Legal Issues
+
***Failure Modes
+
***Challenges in Installation/Use by System Administrator
+
***Performance
+
***Cost
+
***Conclusion (?? what would that be??)
+
**Windows EFS (BJ)
+
***Overview
+
****When Developed
+
****Platform(s)
+
****Current Version
+
***Key Management
+
***Ease of Use for End Users
+
***Legal Issues
+
***Failure Modes
+
***Challenges in Installation/Use by System Administrator
+
***Performance
+
***Cost
+
***Conclusion (?? what would that be??)
+
*Common Issues/Problems (ALL)
+
**Impact on computer forensics
+
**Impact on end-users (i.e. what if you are away on a business trip and you have to go to the hospital and all of your files are encrypted on your laptop?) (or even worse, what if you die and all your financial information is encrypted?)
+
**Impact on business owners (e.g. what if an employee quits and all that person's data files, contact info, etc. are encrypted)
+
*Future (ALL)
+
**What would be useful to add or remove
+
**How we would accomplish the changes we suggest
+
*Conclusion. (ALL)
+
 
+
[[User:Bjl170|Bjl170]] 20:23, 14 November 2005 (EST)
+
 
+
[[User:Lenageraghty|Lenageraghty]] 08:36, 11 November 2005 (EST)
+
 
+
=== Questions : ===
+
* What systems are currently available ?
+
 
+
[[User:Lenageraghty|Lenageraghty]] 08:48, 11 November 2005 (EST)
+
 
+
=== Suggestions/Questions/Outline ?: ===
+
* Solutions from other storage vendors.
+
* Desirable features for a cryptographical file system.
+
* cost
+
** performance
+
** total solution for end-users
+
** Key management for cryptographical file system
+
** Ease of use by end-users
+
** Failure modes
+
** Challenges in using/installing
+
 
+
[[User:Lenageraghty|Lenageraghty]] 22:48, 7 November 2005 (EST)
+
 
+
===== comment from TA (Joe)  =====
+
That looks like some of the right inroads.  Remember that the paper is
+
not very long, so you may want to focus on the three systems and do a
+
deep analysis.  Certainly some things to think about:
+
      Simson's lecture where he talked about it
+
      Failure modes of such systems
+
      Challenges in using/installing
+
 
+
''comment from teacher:'' Please remember that this Wiki is publically accessible on the Internet. It's great if you can improve the resource for everbody. But do try to do that, rather than just creating your own space...
+

Revision as of 07:41, 20 April 2007

Websites about digital forensics and related topics.

Digital Forensics

Non-Digital Forensics