A conceptual model for digital forensic readiness

被引:0
作者
Pooe, Antonio [1 ]
Labuschagne, L. [1 ]
机构
[1] Univ S Africa, ZA-0001 Pretoria, South Africa
来源
2012 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA) | 2012年
关键词
digital forensic readiness; computer forensics; data integrity; digital evidence; incident handling; empirical research;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The ever-growing threats of fraud and security incidents present many challenges to law enforcement and organisations across the globe. This has given rise to the need for organisations to build effective incident management strategies, which will enhance the company's reactive capability to security incidents. The aim of this paper is to propose proactive activities an organisation can undertake in order to increase its ability to respond to security incidents and create a digitally forensic ready workplace environment. The study constitutes exploratory research, with the use of a systematic literature review as a basis to identify activities relating to a digitally forensic ready environment. While much has been written about how organisations can prepare to respond to security incidents, findings show an absence of a digital forensic readiness model. This paper concludes by presenting such a conceptual model. This study contributes to the greater body of knowledge on the design and implementation of a digital forensic readiness programme, aimed at maximising the use of digital evidence in an organisation.
引用
收藏
页数:8
相关论文
共 50 条
[41]   THE ADVANCED DATA ACQUISITION MODEL (ADAM): A PROCESS MODEL FOR DIGITAL FORENSIC PRACTICE [J].
Adams, Richard ;
Hobbs, Val ;
Mann, Graham .
JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2013, 8 (04) :25-48
[42]   IMPLEMENTING FORENSIC READINESS USING PERFORMANCE MONITORING TOOLS [J].
van Staden, Franscois ;
Venter, Hein .
ADVANCES IN DIGITAL FORENSICS VIII, 2012, 383 :261-270
[43]   The importance of Corporate Forensic Readiness in the information security framework [J].
Pangalos, G. ;
Ilioudis, C. ;
Pagkalos, I. .
19TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE 2010), 2010, :12-16
[44]   Preparing IoT-enabled organisations for digital forensics: model for readiness and resilience [J].
Kuku, Oyeyemi ;
Chrysikos, Alexandros ;
Salekzamankhani, Shahram .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (04)
[45]   An open source forensic tool to visualize digital evidence [J].
Vlastos, Emmanouil ;
Patel, Ahmed .
COMPUTER STANDARDS & INTERFACES, 2007, 29 (06) :614-625
[46]   From Digital Forensic Report to Bayesian Network Representation [J].
Lee, Robert ;
Lang, Sheau-Dong ;
Stenger, Kevin .
ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, :303-+
[47]   An open source forensic tool to visualize digital evidence [J].
Vlastos, Emmanouil ;
Patel, Ahmed .
COMPUTER STANDARDS & INTERFACES, 2008, 30 (1-2) :8-19
[48]   Digital forensic standards and digital evidence in Polish criminal proceedings. An updated definition of digital evidence in forensic science [J].
Lewulis, Piotr .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (04) :403-417
[49]   Cloud-Based Framework for Performing Digital Forensic Investigations [J].
Prakash, Vijay ;
Williams, Alex ;
Garg, Lalit ;
Barik, Pradip ;
Dhanaraj, Rajesh Kumar .
INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2022, 29 (04) :419-441
[50]   A study on the forensic mechanisms of VoIP attacks: Analysis and digital evidence [J].
Yen, Yun-Sheng ;
Lin, I-Long ;
Wu, Bo-Lin .
DIGITAL INVESTIGATION, 2011, 8 (01) :56-67