Video: Members of the panel are Bill Gardner @oncee, Ray Davidson @RayDavidson, Adrian Crenshaw @irongeek_adc, Me! @selil @DrWhomPhD Rob Jorgensen. The members of the panel were great and I felt honored to be included. After the video feel free to read…
Category: Purdue
Hey it’s where Sam used to work.
3 Question interviewers might ask
This is in answer to the three questions that reveal everything from Inc.com by Jeff Haden (@Jeff_Haden). I thought it was interesting as a professor for my students to see what I had done, but more importantly as a $consultant…
U.S. Bank of Cyber: An analysis of Cyber Attacks on the U.S. Financial System
This gallery contains 1 photo →
BLUF: Writing for government senior leadership
The acronym BLUF stands for bottom line up front. The inverted pyramid and BLUF style of writing is a tool used to communicate to leadership quickly, in times of stress, or when the topic is fairly controversial. These writing tools focus…
iPad iOS 7 Forensics Approach Using AccessData Software
Abstract With the fast growth of sold iPad since it was introduced in 2010, we knew by now that it is almost everywhere. Nowadays, iPad can replace Personal Computers especially if its equipped with some applications to process documents that…
Forensic analysis of a JVC KD-HDR receiver
Forensic analysis of a JVC KD-HDR receiver Abstract I sought to discover what things of forensic interest can be extracted from a JVC KD-HDR50 automobile receiver. As the device has multiple inputs and a persistent storage mechanism, there should be…
Forensic Analysis of a Roku XS 2
Abstract The Roku XS 2 is digital media streaming devices made by Roku Incorporation. The Roku is a relatively new device. The first generation of Roku was introduced on May 20th, 2008 (Roku Inc. Press Release, 2008). The current…
Microsoft Surface RT 2 Tablet
Abstract The following paper is a report detailing an attempt at digital forensic data acquisition and analysis of Microsoft’s Surface RT 2 tablet with Windows 8.1 operating system. The paper details the specifications of the tablet device listing its…
Pebble Data Acquisition
Glass Acquisition and Analysis
Glass Acquisition and Analysis Faisal Talal Alaskandrani Purdue University Due Date : 14/03/2014 CNIT 58100 CFM Under the direction of Dr. Samuel Liles Abstract Google Glass developed by Google is an embedded device with an android operating…
Examples of pre-history (before 1980) high technology attacks
The following are all from the very excellent book on high tech crime written in the late 1970s. I reviewed this book awhile back. Whiteside, Thomas, “Computer Capers: Tales of electronic thievery, embezzlement, and fraud”, Thomas Y. Crowel, New York,…
Conference Submissions and Presentations made more effective with 10 quick tips
Strongly suggested viewing for students and professionals that are going to be doing presentations. Matthew McCullough walks you through a 10 step program of doing a presentation.
Concept map looking at nation state ICT capabilities
This gallery contains 1 photo →
2/5 Purdue, My Classes Canceled
For courses on Wednesday 2/5 I will NOT be having class. All courses on Purdue campus are cancelled at this point until 1PM. I will NOT be holding office hours today. We will reschedule the laboratory for today. Do the…
Cyber forensics of mobile and embedded devices CNIT 58100 CFM
Course Description: Consumer technologies are rapidly moving forward with items integrating processing, storage, and transmission into their base functionality. The enterprise issues with bring your own device has rapidly expanded requirements on forensics investigators to address a plethora of mobile…