Difference between pages "Residual Data" and "User:John Crout"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
m
 
(MPH, BSEE, CISSP. Advocating volunteer relationships with federal agencies. ("Politician" is a paid position that needs oversight).)
 
Line 1: Line 1:
Residual Data is data that is unintentionally left behind on computer media. In forensic usage, remnant data is typically left behind after attempts have been made to delete the data, after the data has been forgotten, or after the media on which the data resides has been decomissioned.
+
Management and design experience from avionics and medical devices industries
  
Residual data appears at all levels of modern computer systems:
+
ISSA Colorado Springs
* Computer systems that are discarded.
+
* Partitions in hard drives that are deleted.
+
* Files on hard drives that are deleted but not overwritten.
+
* Snippets of text in Microsoft Word files.
+
* Heap variables that are freed with '''free()'''
+
* Automatic variables left on the stack of languages like C or garbage collected in languages like Java.
+
  
=Papers=
+
USCG Auxiliary
Byers, Simon. [[Media:Scalable Exploitation.pdf|Scalable Exploitation of, and Responses to Information Leakage Through Hidden Data in Published Documents]], AT&T Research, April 2003
+
  Vice-Flotilla Commander, 8WR 16 (since Dec 2011)
 +
  Authorized for direct communications with CIO (outside of Chain of Leadership) since Feb 2010
 +
  National Staff, Branch Chief Data Security (Dec 2008 - Jan 2010)
 +
  Flotilla Staff Officer - Communications Services (Nov 2008 - Dec 2010)
  
Chow, J., B. Pfaff, T. Garfinkel, K. Christopher, M. Rosenblum, 
+
IGC Denver chapter, member
[[Media:Tainbochs.pdf|Understanding Data Lifetime via Whole System Simulation]], Proceedings of the 13th USENIX Security Symposium, 2004.
+
  
Garfinkel, S. and Shelat, A., "Remembrance of Data Passed: A Study of Disk Sanitization Practices," IEEE Security and Privacy, January/February 2003.
+
SoftHome.net (since Oct 2003)
 +
  System/Network Administrator
  
=See Also=
+
NIST Cloud Security Working Group contributor
* [[Sanitizing Tools]]
+
 
* [[Remnant Data]]
+
American Red Cross
* [http://www.iphoneatlas.com/2008/05/19/refurbished-iphones-may-contain-other-users-personal-data/ Residual data on iPhones]
+
 
 +
Prev:
 +
Texas Engineering Extension (TEEX), div. of Texas A&M (since June 2011)
 +
  Adjunct, DHS/FEMA certified cybersecurity courses

Revision as of 18:57, 10 July 2012

Management and design experience from avionics and medical devices industries

ISSA Colorado Springs

USCG Auxiliary

 Vice-Flotilla Commander, 8WR 16 (since Dec 2011)
 Authorized for direct communications with CIO (outside of Chain of Leadership) since Feb 2010
 National Staff, Branch Chief Data Security (Dec 2008 - Jan 2010)
 Flotilla Staff Officer - Communications Services (Nov 2008 - Dec 2010)

IGC Denver chapter, member

SoftHome.net (since Oct 2003)

 System/Network Administrator

NIST Cloud Security Working Group contributor

American Red Cross

Prev: Texas Engineering Extension (TEEX), div. of Texas A&M (since June 2011)

 Adjunct, DHS/FEMA certified cybersecurity courses