Applying a Digital Forensic Readiness Framework: Three Case Studies

被引:0
作者
Mouhtaropoulos, Antonis [1 ]
Dimotikalis, Panagiotis [2 ]
Li, Chang-Tsun [1 ]
机构
[1] Univ Warwick, Dept Comp Sci, Coventry CV4 7AL, W Midlands, England
[2] Akmi Metropolitan Coll, Dept Comp Sci, Thessaloniki, Greece
来源
2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST) | 2013年
关键词
digital forensic readiness; proactive forensics; digital evidence; digital forensic investigation;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
A digital forensic investigation primarily attempts to reactively respond to an information security incident. While the predominant goal of an investigation is the maintenance of digital evidence of forensic value, little academic research has been conducted on an organization's proactive forensic capability. This capability is referred to as digital forensic readiness and aims to maximize the forensic credibility of digital evidence, while minimizing its post-incident forensic investigation. In this paper, we classify forensic investigation frameworks to expose gaps in proactive forensics research and we review three prominent information security incidents with regard to proactive forensics planning. The applicability of a proactive forensic plan into each incident is then discussed and put into context.
引用
收藏
页码:217 / 223
页数:7
相关论文
共 19 条
[1]  
[Anonymous], 2001, 1 DIG FOR RES WORKSH
[2]  
[Anonymous], 2004, DIGIT INVEST
[3]  
[Anonymous], SPECTRUM IEEE
[4]  
[Anonymous], 2003, INT J DIGIT EVID
[5]   A hierarchical, objectives-based framework for the digital investigations process [J].
Beebe, Nicole Lang ;
Clark, Jan Guynes .
DIGITAL INVESTIGATION, 2005, 2 (02) :147-167
[6]  
Ciardhuain S. O., 2006, INT J DIGITAL EVIDEN, V3
[7]  
FORRESTER J, 2007, IFIPSEC 2007
[8]  
Freiling F. C., 2007, IMF 2007 IT INC MAN
[9]   The stages of cybercrime investigations: Bridging the gap between technology examination and law enforcement investigation [J].
Hunton, Paul .
COMPUTER LAW & SECURITY REVIEW, 2011, 27 (01) :61-67
[10]  
Khurana H., 2009, P 8 S ID TRUST INT, P38, DOI DOI 10.1145/1527017.1527023