A comparative study on data protection legislations and government standards to implement Digital Forensic Readiness as mandatory requirement

被引:13
作者
Park, Sungmi [1 ]
Akatyev, Nikolay [2 ]
Jang, Yunsik [1 ]
Hwang, Jisoo [3 ]
Kim, Donghyun [3 ]
Yu, Woonseon [3 ]
Shin, Hyunwoo [3 ]
Han, Changhee [3 ]
Kim, Jonghyun [4 ]
机构
[1] Hallym Univ, Inst Legal Informat & Forens Sci, Chunchon, South Korea
[2] Horangi Cyber Secur, Seoul, South Korea
[3] Korea IT Res Inst, BoB, Seoul, South Korea
[4] DOUZONE Forens Ctr, Seoul, South Korea
关键词
Incident response; Digital forensic investigation; Digital foresic readiness; Data protection legislation; Minimum security standards;
D O I
10.1016/j.diin.2018.01.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many data breaches happened due to poor implementation or complete absence of security controls in private companies as well as in government organizations. Many countries work on improvement of security requirements and implementing them in their legislation. However, most of the security frameworks are reactive and do not address relevant threats. The existing research suggests Digital Forensic Readiness as proactive measures, but there is only one example of its implementation as a policy. Our work surveys the current state of data protection legislation in the selected countries and their initiatives for the implementation of Digital Forensic Readiness. Then we discuss if Digital Forensic Readiness as a mandatory requirement can improve data protection state in both public and private sectors, evaluating possible challenges. We contribute suggestions for the adoption of Digital Forensic Readiness as a mandatory requirement for private companies and government organizations. (C) 2018 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.
引用
收藏
页码:S93 / S100
页数:8
相关论文
共 39 条
[1]  
[Anonymous], TECHCRUNCH
[2]  
[Anonymous], 2001, TECHNICAL REPORT
[3]  
[Anonymous], 2017, GDPR GUIDELINES CONS
[4]  
[Anonymous], 2010, LIABILITIES TECHNOLO
[5]  
[Anonymous], 2007, GUARDIAN
[6]  
Baek S. J., 2012, INTERNET INFORM SECU, V3, P34
[7]  
Bradford P.G., 2004, INT C INF TECHN COD
[8]  
Bryan Cave, 2017, 2017 DAT BREACH LIT
[9]  
BSI, 2015, IT SICH
[10]  
BSI, 2017, MIND BSI NACH 8 ABS