Improved Tiled Bitmap Forensic Analysis Algorithm

In computer network world, the needs for security and proper systems of control are obvious and find out the intruders who do the modification and modified data. Now-a-days, frauds that occur in companies are not only by outsiders but also by insiders. Insider may perform illegal activity & try to hide illegal activity. Companies would like to be assured that such illegal activity i.e. tampering has not occurred, or if it does, it should be quickly discovered. Mechanisms now exist that detect tampering of a database, through the use of cryptographically-strong hash functions.

Provided by: Accent Social and Welfare Society Topic: Data Management Date Added: Dec 2012 Format: PDF

Find By Topic