Letteratura scientifica selezionata sul tema "Digital forensic readiness management"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Digital forensic readiness management".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Digital forensic readiness management"

1

Serketzis, Nikolaos, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis e George J. Pangalos. "Actionable threat intelligence for digital forensics readiness". Information & Computer Security 27, n. 2 (12 giugno 2019): 273–91. http://dx.doi.org/10.1108/ics-09-2018-0110.

Testo completo
Abstract (sommario):
PurposeThe purpose of this paper is to formulate a novel model for enhancing the effectiveness of existing digital forensic readiness (DFR) schemes by leveraging the capabilities of cyber threat information sharing.Design/methodology/approachThis paper uses a quantitative methodology to identify the most popular cyber threat intelligence (CTI) elements and introduces a lightweight approach to correlate those with potential forensic value, resulting in the quick and accurate triaging and identification of patterns of malicious activities.FindingsWhile threat intelligence exchange steadily becomes a common practice for the prevention or detection of security incidents, the proposed approach highlights its usefulness for the digital forensics (DF) domain.Originality/valueThe proposed model can help organizations to improve their DFR posture, and thus minimize the time and cost of cybercrime incidents.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Reddy, K., e H. S. Venter. "The architecture of a digital forensic readiness management system". Computers & Security 32 (febbraio 2013): 73–89. http://dx.doi.org/10.1016/j.cose.2012.09.008.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Ali, Md Iman, e Sukhkirandeep Kaur. "Next-Generation Digital Forensic Readiness BYOD Framework". Security and Communication Networks 2021 (20 marzo 2021): 1–19. http://dx.doi.org/10.1155/2021/6664426.

Testo completo
Abstract (sommario):
Intel’s “Bring Your Own Device” (BYOD) adoption quickly became popular as an alternative workplace solution strategy. It enables employees to use their personally owned devices to perform business activities, leading to increased productivity and employee satisfaction. However, BYOD also brought associated risks because of exponential growth in the number of cybersecurity incidents due to which business ecosystem gets disrupted and fragmented. Although several methods and mechanisms have been developed and adopted to mitigate the risk associated with BYOD, they still represent a challenge as corporate network gets exposed to inherent threats caused by the BYOD threat landscape. This work demonstrates especially two key aspects: The first focuses on how to detect and protect BYOD environment from an advanced level attack which cannot be detected by traditional tools and techniques even though available tools are quite effective. Before the attack and damage to the critical infrastructure due to BYOD threat, a strategy was indeed the key requirement for detecting attacks and protecting the environment. The second part of the research focuses on conducting forensic investigation model and developing a new approach by providing a reliable forensic investigation infrastructure to find digital evidence and detect the source of attack. This research work concluded with two different novel strategic ideas. The first part contributes to a new method of detecting and protecting against malicious activities which cannot be otherwise detected and protected by traditional security technology like IPS, IDS, AntiBot, or AntiVirus. The proposed technique compared to the existing methods led to a significant contribution to the identification of threats before an attack takes place. The second part of the research contributes to the defining of a new approach of the next-generation digital forensic readiness (NG-DFR) model in order to build a cyber forensic ecosystem so that cyber secured BYOD environment can be enabled safely.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Elyas, Mohamed, Sean B. Maynard, Atif Ahmad e Andrew Lonie. "Towards A Systemic Framework for Digital Forensic Readiness". Journal of Computer Information Systems 54, n. 3 (marzo 2014): 97–105. http://dx.doi.org/10.1080/08874417.2014.11645708.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Pratama, Yogi. "MAKING OF DIGITAL FORENSIC READINESS INDEX (DiFRI) MODELS TO MALWARE ATTACKS". Cyber Security dan Forensik Digital 3, n. 2 (11 dicembre 2020): 1–5. http://dx.doi.org/10.14421/csecurity.2020.3.2.2005.

Testo completo
Abstract (sommario):
The increasing number of malware spread in the world today, then there will be more opportunities to commit crime, so readiness is needed for every internet user in dealing with these crimes. The readiness to handle crime is called digital forensic readiness. Therefore, we need a specific digital forensic readiness model to measure the level of readiness of internet users or institutions in achieving malware attacks. This model has the main components used to determine or calculate the level of readiness of internet users or institutions, the main components are the strategy component, the policy & procedure component, the technology & security component, the digital forensic response component, the control & legality component. The calculation method used in this study is a Likert Scale, with this method the results will be obtained that are closer to the real situation. The value / index of readiness level obtained will provide recommendations to internet users and these recommendations can be used to make improvements properly and on target.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Kebande, Victor R., e H. S. Venter. "Novel digital forensic readiness technique in the cloud environment". Australian Journal of Forensic Sciences 50, n. 5 (17 gennaio 2017): 552–91. http://dx.doi.org/10.1080/00450618.2016.1267797.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Englbrecht, Ludwig, Stefan Meier e Günther Pernul. "Towards a capability maturity model for digital forensic readiness". Wireless Networks 26, n. 7 (1 gennaio 2019): 4895–907. http://dx.doi.org/10.1007/s11276-018-01920-5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Kebande, Victor R., Phathutshedzo P. Mudau, Richard A. Ikuesan, H. S. Venter e Kim-Kwang Raymond Choo. "Holistic digital forensic readiness framework for IoT-enabled organizations". Forensic Science International: Reports 2 (dicembre 2020): 100117. http://dx.doi.org/10.1016/j.fsir.2020.100117.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Elyas, Mohamed, Atif Ahmad, Sean B. Maynard e Andrew Lonie. "Digital forensic readiness: Expert perspectives on a theoretical framework". Computers & Security 52 (luglio 2015): 70–89. http://dx.doi.org/10.1016/j.cose.2015.04.003.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Kovrigin, E. A., e V. A. Vasilyev. "The problems of quality management system readiness to integrate modern digital technologies". Quality. Innovation. Education, n. 5 (2020): 17–23. http://dx.doi.org/10.31145/1999-513x-2020-5-17-23.

Testo completo
Abstract (sommario):
Given the trends in the modern world, as well as the rapid growth of digitalization, it is safe to say that it will inevitably affect almost all areas of human life and activities. Dmitriev’s English dictionary defines the word readiness: «It is a state where everything is done to start doing something.» Accordingly, an assessment of the company’s readiness to integrate modern digital technologies will identify opportunities, risks and threats, strengths and weaknesses of the enterprise, as well as to formulate a list of initial measures that need to be implemented. Thus, there is an urgent need to find an answer to the following questions: «How (by, what criteria and indicators) to measure readiness?», «What are the approaches to readiness assessment?» The purpose of this article is to develop a model and algorithm to assess the company’s readiness to integrate modern digital technologies. Modelling techniques were used to achieve this goal, as well as to analyze and generalize information. As a result of the research, a model for assessing the company’s readiness to integrate modern digital technologies has been developed and tested, based on the quality management model presented in the ISO 9000 series standards. A particular example shows how to use it and what it ultimately allows you to see and evaluate.
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Tesi sul tema "Digital forensic readiness management"

1

Kruger, Jaco-Louis. "Digital forensic readiness for IOT devices". Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/73385.

Testo completo
Abstract (sommario):
The Internet of Things (IoT) has evolved to be an important part of modern society. IoT devices can be found in several environments such as smart homes, transportation, the health sector, smart cities and even facilitates automation in organisations. The increasing dependence on IoT devices increases the possibility of security incidents in the physical or cyber environment. Traditional methods of digital forensic (DF) investigations are not always applicable to IoT devices due to their limited data processing resources. A possible solution for conducting forensic investigations on IoT devices is to utilise a proactive approach known as digital forensic readiness (DFR). This dissertation firstly aims to conduct a thorough review of the available literature in the current body of knowledge to identify a clear process that can be followed to implement DFR tailored for IoT devices. This dissertation then formulates requirements for DFR in IoT based on existing forensic techniques. The requirements for DFR in IoT give rise to the development of a model for DFR in IoT, which is then implemented in a prototype for IoT devices. The prototype is subsequently tested and evaluated on IoT devices that conduct proactive DFR in a simulation of a smart home system. Finally, the dissertation illustrates the feasibility of the DFR processes for IoT and serves as a basis for future research with regards to DFR in IoT. This dissertation will impact future research with regards to developing a standard for DFR in IoT.
Dissertation (MSc)--University of Pretoria, 2019.
Computer Science
MSc
Unrestricted
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Singh, Avinash. "A Digital Forensic Readiness Approach for Ransomware Forensics". Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/75610.

Testo completo
Abstract (sommario):
Computers play a vital role in the automation of tedious tasks in our everyday lives. With the adoption of the advances in technology, there is a significant increase in the exploitation of security vulnerabilities, particularly in Windows computing environments. These exploitations are mostly carried out by malicious software (malware). Ransomware, a variant of malware which encrypts user files and retains the decryption key for ransom. Ransomware has shown its dominance over the years wreaking havoc to many organizations and users. This global digital epidemic is continuously on the rise with no signs of being eradicated. The current method of mitigation and propagation of malware and its variants, such as anti-viruses, have proven ineffective against most ransomware attacks. Theoretically, Ransomware retains footprints of the attack process in the Windows Registry as well as volatile memory of the infected machine. With the adoption of Digital Forensic Readiness (DFR) processes organizations can better prepare for these types of attacks. DFR provides mechanisms for pro-active collection of digital artifacts. These artifacts play a vital role when a digital investigation is conducted where these artifacts may not be available post-incident. The availability of such artifacts can be attributed to the anti-forensic properties of the ransomware itself cleaning up all the evidence before it can be investigated. Ransomware investigation often to a lengthy process because security researchers need to disassemble and reverse engineer the ransomware in order to find a inherit flaw in the malware. In some cases, the ransomware is not available post-incident which makes it more difficult. Therefore, study proposed a framework with the integration of DFR mechanisms as a process to mitigate ransomware attacks whilst maximizing Potential Digital Evidence (PDE) collection. The proposed framework was evaluated in compliance with the ISO/IEC 27043 standard as well as expert review using two prototype tools. These prototype tools realize the framework by providing a proof of concept implementation of such a framework within an organization. The evaluation revealed that the proposed framework has the potential to harness system information prior to, and during a ransomware attack. This information can then be used to help forensic investigators to potentially decrypt the encrypted machine, as well as providing automated analysis of the ransomware relieving the burden of complicated analysis. The implementation of the proposed framework can potentially be a major breakthrough in mitigating this global digital endemic that has plagued various organizations.
Dissertation (MSc)--University of Pretoria, 2019.
Computer Science
MSc (Computer Science)
Unrestricted
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Mouton, Francois. "Digital forensic readiness for wireless sensor network environments". Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/24955.

Testo completo
Abstract (sommario):
The new and upcoming field of wireless sensor networking is unfortunately still lacking in terms of both digital forensics and security. All communications between different nodes (also known as motes) are sent out in a broadcast fashion. These broadcasts make it quite difficult to capture data packets forensically and, at the same time, retain their integrity and authenticity. The study presents several attacks that can be executed successfully on a wireless sensor network, after which the dissertation delves more deeply into the flooding attack as it is one of the most difficult attacks to address in wireless sensor networks. Furthermore, a set of factors is presented to take into account while attempting to achieve digital forensic readiness in wireless sensor networks. The set of factors is subsequently discussed critically and a model is proposed for implementing digital forensic readiness in a wireless sensor network. The proposed model is next transformed into a working prototype that is able to provide digital forensic readiness to a wireless sensor network. The main contribution of this research is the digital forensic readiness prototype that can be used to add a digital forensics layer to any existing wireless sensor network. The prototype ensures the integrity and authenticity of each of the data packets captured from the existing wireless sensor network by using the number of motes in the network that have seen a data packet to determine its integrity and authenticity in the network. The prototype also works on different types of wireless sensor networks that are in the frequency range of the network on which the prototype is implemented, and does not require any modifications to be made to the existing wireless sensor network. Flooding attacks pose a major problem in wireless sensor networks due to the broadcasting of communication between motes in wireless sensor networks. The prototype is able to address this problem by using a solution proposed in this dissertation to determine a sudden influx of data packets within a wireless sensor network. The prototype is able to detect flooding attacks while they are occurring and can therefore address the flooding attack immediately. Finally, this dissertation critically discusses the advantages of having such a digital forensic readiness system in place in a wireless sensor network environment. Copyright
Dissertation (MSc)--University of Pretoria, 2012.
Computer Science
unrestricted
Gli stili APA, Harvard, Vancouver, ISO e altri
4

De, Souza Pedro. "A Chain of findings for digital investigations". Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/40842.

Testo completo
Abstract (sommario):
Digital Forensic investigations play a vital role in our technologically enhanced world, and it may incorporate a number of different types of evidence — ranging from digital to physical. During a Digital Forensics investigation an investigator may formulate a number of hypotheses, and in order to reason objectively about them, an investigator must take into account such evidence in its entirety, relying on multiple sources. When formulating such objective reasoning an investigator must take into account not only inculpatory evidence but also exculpatory evidence and evidence of tampering. In addition, the investigator must factor in the reliability of the evidence used, the potential for error (tool and human based) and they must factor in the certainty with which they can make various claims. By doing so and creating a detailed audit trail of all actions performed by the investigator they can be better prepared against challenges against their work when it is presented. An investigator must also take into account the dynamic aspects of an investigation, such as certain evidence no longer being admissible, and they must continuously factor these aspects into their reasoning, to ensure that their conclusions still hold. Investigations may draw over a large period of time, and should the relevant information not be captured in detail, it may be lost or forgotten, affecting the reliability of an investigator’s findings and affecting future investigators’ capability to build on and continue an investigator’s work. In this dissertation we investigate whether it is possible to provide a formalised means for capturing and encoding an investigator’s reasoning process, in a detailed and structured manner. By this we mean we would like to capture and encode an investigator’s hypotheses, their arguments, their conclusions and the certainty with which they can make such claims, as well as the various pieces of evidence (digital and physical) that they use as a foundation for their arguments. We also want to capture the steps an investigator took when formulating these arguments and the steps an investigator took in order to get evidence into its intended form. The capturing of such a detailed reasoning process helps to allow for a more thorough reconstruction of an investigator’s finding, further improving the reliability that can be placed in them. By encoding the investigator’s reasoning process, an investigator can more easily receive feedback on the impacts that the various dynamic aspects of an investigation have upon their reasoning. In order to achieve these goals, our dissertation presents a model, called the Chain of Findings, allowing investigators to formulate and capture their reasoning process throughout the investigation, using a combination of goal-driven and data-driven approaches. When formulating their reasoning, the model allows investigators to treat evidence, digital and physical, uniformly as building blocks for their arguments and capture detailed information of how and why they serve their role in an investigator’s reasoning process. In addition, the Chain of Findings offers a number of other uses and benefits including the training of investigators and Digital Forensic Readiness.
Dissertation (MSc)--University of Pretoria, 2013.
gm2014
Computer Science
unrestricted
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Mankantshu, Mninawe Albert. "Investigating the factors that influence digital forensic readiness in a South African organisation". Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/8504.

Testo completo
Abstract (sommario):
Includes bibliographical references.
Computer crimes affect the bottom line of organisations across the globe. The ability of criminals to exploit organisational systems and avoid prosecution is a concern for most organisations. This is due to the increased use of information and communication technology (ICT) by individuals and organisations. The rapid growth of ICT has affected our communication and information exchange. These advances have not only influenced the way we conduct our daily activities, but has also led to new opportunities, risks and challenges for technical and legal structures. Unfortunately, some individuals and groups have decided to use these ICT advances in order to engage in criminal activities, such as cybercrime. The increase of cyber-related crimes puts a lot of pressure on law enforcement agencies and organisations across the globe to produce credible digital forensic evidence.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Pollitt, Mark. "The Hermeneutics of the Hard Drive: Using Narratology, Natural Language Processing, and Knowledge Management to Improve the Effectiveness of the Digital Forensic Process". Doctoral diss., University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/6004.

Testo completo
Abstract (sommario):
In order to protect the safety of our citizens and to ensure a civil society, we ask our law enforcement, judiciary and intelligence agencies, under the rule of law, to seek probative information which can be acted upon for the common good. This information may be used in court to prosecute criminals or it can be used to conduct offensive or defensive operations to protect our national security. As the citizens of the world store more and more information in digital form, and as they live an ever-greater portion of their lives online, law enforcement, the judiciary and the Intelligence Community will continue to struggle with finding, extracting and understanding the data stored on computers. But this trend affords greater opportunity for law enforcement. This dissertation describes how several disparate approaches: knowledge management, content analysis, narratology, and natural language processing, can be combined in an interdisciplinary way to positively impact the growing difficulty of developing useful, actionable intelligence from the ever-increasing corpus of digital evidence. After exploring how these techniques might apply to the digital forensic process, I will suggest two new theoretical constructs, the Hermeneutic Theory of Digital Forensics and the Narrative Theory of Digital Forensics, linking existing theories of forensic science, knowledge management, content analysis, narratology, and natural language processing together in order to identify and extract narratives from digital evidence. An experimental approach will be described and prototyped. The results of these experiments demonstrate the potential of natural language processing techniques to digital forensics.
Ph.D.
Doctorate
Dean's Office, Arts and Humanities
Arts and Humanities
Texts and Technology
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Umurerwa, Janviere, e Maja Lesjak. "AI IMPLEMENTATION AND USAGE : A qualitative study of managerial challenges in implementation and use of AI solutions from the researchers’ perspective". Thesis, Umeå universitet, Institutionen för informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-187810.

Testo completo
Abstract (sommario):
Artificial intelligence (AI) technologies are developing rapidly and cause radical changes in organizations, companies, society, and individual levels. Managers are facing new challenges that they might not be prepared for. In this work, we seek to explore managerial challenges experienced while implementing and using AI technologies from the researchers’ perspective. Moreover, we explore how appropriate ethical deliberations should be applied when using big data concerning AI and the meaning of understanding or defining it. We describe qualitative research, the triangulation that includes related literature, in-depth interviews with researchers working on related topics from various fields, and a focus group discussion. Our findings show that AI algorithms are not universal, objective, or neutral and therefore researchers believe, it requires managers to have a solid understanding of the complexity of AI technologies and the nature of big data. Those are necessary to develop sufficient purchase capabilities and apply appropriate ethical considerations. Based on our results, we believe researchers are aware that those issues should be handled, but so far have too little attention. Therefore, we suggest further discussion and encourage research in this field.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

MacNeil, Tanya. "Police Opinions of Digital Evidence Response Handling in the State of Georgia: An Examination from the Viewpoint of Local Agencies’ Patrol Officers". NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/369.

Testo completo
Abstract (sommario):
This research examined opinions of local law enforcement agencies’ patrol officers in the State of Georgia regarding preparedness and expectations for handling of digital evidence. The increased criminal use of technology requires that patrol officers be prepared to handle digital evidence in many different situations. The researcher’s goal was to gain insight into how patrol officers view their preparedness to handle digital evidence as well as their opinions on management expectations regarding patrol officers’ abilities to handle digital evidence. The research focused on identifying whether a gap existed between patrol officers’ opinions of digital evidence and the patrol officers’ views on what management expectations are for patrol officers handling digital evidence. Using a Web-based survey, the researcher collected data from 144 departments, 407 individual patrol officers in four strata across the State of Georgia. The analysis of the data found that most patrol officers handle digital evidence in at least some situations. The patrol officers’ opinions stated that most understood management expectations for handling of digital evidence and felt those expectations were realistic based on the officers’ current knowledge and training; therefore no significant gap was found. The patrol officers state that they need additional training in order to stay up to date with the current and future needs for handling existing and new technology.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Reddy, Kamil. "On digital forensic readiness for information privacy incidents". Thesis, 2012. http://hdl.handle.net/2263/28209.

Testo completo
Abstract (sommario):
The right to information privacy is considered a basic human right in countries that recognise the right to privacy. South Africa, and other countries that recognise this right, offer individuals legal protections for their information privacy. Individuals, organisations and even governments in these countries often have an obligation under such laws to protect information privacy. Large organisations, for example, multinational companies and government departments are of special concern when it comes to protecting information privacy as they often hold substantial amounts of information about many individuals. The protection of information privacy, therefore, has become ever more significant as technological advances enable information privacy to be breached with increasing ease. There is, however, little research on holistic approaches to protecting information privacy in large organisations. Holistic approaches take account of both technical and non-technical factors that affect information privacy. Nontechnical factors may include the management of information privacy protection measures and other factors such as manual business processes and organisational policies. Amongst the protections that can be used by large organisations to protect information privacy is the ability to investigate incidents involving information privacy. Since large organisations typically make extensive use of information technology to store or process information, such investigations are likely to involve digital forensics. Digital forensic investigations require a certain amount of preparedness or readiness for investigations to be executed in an optimal fashion. The available literature on digital forensics and digital forensic readiness (DFR), unfortunately, does not specifically deal with the protection of information privacy, which has requirements over and above typical digital forensic investigations that are more concerned with information security breaches. The aim of this thesis, therefore, is to address the lack of research into DFR with regard to information privacy incidents. It adopts a holistic approach to DFR since many of the necessary measures are non-technical. There is, thus, an increased focus on management as opposed to specific technical issues. In addressing the lack of research into information privacy-specific DFR, the thesis provides large organisations with knowledge to better conduct digital forensic investigations into information privacy incidents. Hence, it allows for increased information privacy protection in large organisations because investigations may reveal the causes of information privacy breaches. Such breaches may then be prevented in future. The ability to conduct effective investigations also has a deterrent effect that may dissuade attempts at breaching information privacy. This thesis addresses the lack of research into information privacy-specific DFR by presenting a framework that allows large organisations to develop a digital forensic readiness capability for information privacy incidents. The framework is an idealistic representation of measures that can be taken to develop such a capability. In reality, large organisations operate within cost constraints. We therefore also contribute by showing how a cost management methodology known as time-driven activity-based costing can be used to determine the cost of DFR measures. Organisations are then able to make cost versus risk decisions when deciding which measures in the framework they wish to implement. Lastly, we introduce the concept of a digital forensics management system. The management of DFR in a large organisation can be a difficult task prone to error as it involves coordinating resources across multiple departments and organisational functions. The concept of the digital forensics management system proposed here allows management to better manage DFR by providing a central system from which information is available and control is possible. We develop an architecture for such a system and validate the architecture through a proof-of-concept prototype.
Thesis (PhD)--University of Pretoria, 2012.
Computer Science
unrestricted
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Pooe, El Antonio. "Developing a multidisciplinary digital forensic readiness model for evidentiary data handling". Thesis, 2018. http://hdl.handle.net/10500/25316.

Testo completo
Abstract (sommario):
There is a growing global recognition as to the importance of outlawing malicious computer related acts in a timely manner, yet few organisations have the legal and technical resources necessary to address the complexities of adapting criminal statutes to cyberspace. Literature reviewed in this study suggests that a coordinated, public-private partnership to produce a model approach can help reduce potential dangers arising from the inadvertent creation of cybercrime havens. It is against this backdrop that the study seeks to develop a digital forensic readiness model (DFRM) using a coordinated, multidisciplinary approach, involving both the public and private sectors, thus enabling organisations to reduce potential dangers arising from the inadvertent destruction and negating of evidentiary data which, in turn, results in the non-prosecution of digital crimes. The thesis makes use of 10 hypotheses to address the five research objectives, which are aimed at investigating the problem statement. This study constitutes qualitative research and adopts the post-modernist approach. The study begins by investigating each of the 10 hypotheses, utilising a systematic literature review and interviews, followed by a triangulation of findings in order to identify and explore common themes and strengthen grounded theory results. The output from the latter process is used as a theoretical foundation towards the development of a DFRM model which is then validated and verified against actual case law. Findings show that a multidisciplinary approach to digital forensic readiness can aid in preserving the integrity of evidentiary data within an organisation. The study identifies three key domains and their critical components. The research then demonstrates how the interdependencies between the domains and their respective components can enable organisations to identify and manage vulnerabilities which may contribute to the inadvertent destruction and negating of evidentiary data. The Multidisciplinary Digital Forensic Readiness Model (M-DiFoRe) provides a proactive approach to creating and improving organizational digital forensic readiness. This study contributes to the greater body of knowledge in digital forensics in that it reduces complexities associated with achieving digital forensic readiness and streamlines the handling of digital evidence within an organisation.
Information Science
Ph.D. (Information Systems)
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Libri sul tema "Digital forensic readiness management"

1

Richard, Ovenden, Redwine Gabriela e Donahue Rachel, a cura di. Digital forensics and born-digital content in cultural heritage collections. Washington, D.C: Council on Library and Information Resources, 2010.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Implementing Digital Forensic Readiness. Elsevier, 2016. http://dx.doi.org/10.1016/c2015-0-00701-8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Sachowski, Jason. Implementing Digital Forensic Readiness. CRC Press, 2019. http://dx.doi.org/10.4324/9780429441363.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Sachowski, Jason. Implementing Digital Forensic Readiness: From Reactive to Proactive Process. Elsevier Science & Technology Books, 2016.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Fraser, Jim. Forensic Science: A Very Short Introduction. Oxford University Press, 2020. http://dx.doi.org/10.1093/actrade/9780198834410.001.0001.

Testo completo
Abstract (sommario):
Forensic Science: A Very Short Introduction introduces the concept of forensic science and explains how it is used in the investigation of crime. It begins at the crime scene itself, explaining the principles and processes of crime scene management, and explores how forensic scientists work, from the reconstruction of events to laboratory examinations. It considers the techniques used, such as fingerprinting, and highlights the immense impact DNA profiling has had. Providing examples from forensic science cases in the UK, USA, and other countries, this VSI considers the techniques and challenges faced around the world. This new edition takes into account developments in areas such as DNA and drug analysis, and the growing field of digital forensics.
Gli stili APA, Harvard, Vancouver, ISO e altri

Capitoli di libri sul tema "Digital forensic readiness management"

1

Dilijonaite, Ausra. "Digital Forensic Readiness". In Digital Forensics, 117–45. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781119262442.ch4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Ngobeni, Sipho, Hein Venter e Ivan Burke. "A Forensic Readiness Model for Wireless Networks". In Advances in Digital Forensics VI, 107–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15506-2_8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Pooe, Antonio, e Les Labuschagne. "Cognitive Approaches for Digital Forensic Readiness Planning". In Advances in Digital Forensics IX, 53–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41148-9_4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Singh, Avinash, Adeyemi R. Ikuesan e Hein S. Venter. "Digital Forensic Readiness Framework for Ransomware Investigation". In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 91–105. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05487-8_5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Valjarevic, Aleksandar, e Hein Venter. "A Harmonized Process Model for Digital Forensic Investigation Readiness". In Advances in Digital Forensics IX, 67–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41148-9_5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Englbrecht, Ludwig, Stefan Meier e Günther Pernul. "Toward a Capability Maturity Model for Digital Forensic Readiness". In Innovative Computing Trends and Applications, 87–97. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03898-4_10.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Forfot, Alexander D., e Grethe Østby. "Digital Forensic Readiness in IoT - A Risk Assessment Model". In Communications in Computer and Information Science, 53–64. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71711-7_5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Simou, Stavros, Ioannis Troumpis, Christos Kalloniatis, Dimitris Kavroudakis e Stefanos Gritzalis. "A Decision-Making Approach for Improving Organizations’ Cloud Forensic Readiness". In Trust, Privacy and Security in Digital Business, 150–64. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98385-1_11.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

van der Veen, Michiel, Aweke Lemma, Mehmet Celik e Stefan Katzenbeisser. "Forensic Watermarking in Digital Rights Management". In Security, Privacy, and Trust in Modern Data Management, 287–302. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-69861-6_19.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Grobler, C. P., e C. P. Louwrens. "Digital Forensic Readiness as a Component of Information Security Best Practice". In New Approaches for Security, Privacy and Trust in Complex Environments, 13–24. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-72367-9_2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Digital forensic readiness management"

1

Bajramovic, Edita, Jürgen Bochtler, Ines Ben Zid e Andreas Lainer. "Planning the Selection and Assignment of Security Forensics Countermeasures". In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67328.

Testo completo
Abstract (sommario):
Cybersecurity incidents are stressful, complex in nature, and frequently are not systematically considered in daily tasks. When correctly managed, operational readiness procedures make sure the availability of data required to successfully and quickly recover from a security incident while lessening the adverse effect. Therefore, protective measures, such as implementation of data diodes, are playing an essential role in defending I&C systems. In addition, applicability of the newest forensic and digital evidence-related standards to the nuclear domain is being evaluated. Results of such evaluation are being considered in the 3D and 2D modeling of cybersecurity relevant assets. The development of the new IEC 63096, downstream standard of IEC 62645, will also support the proposed evaluation and modeling. However, IEC 63096 covers not only forensic and incident management-related security controls but also a broad range of cybersecurity controls. This paper will further explore the security degree-specific selection and overall assignment of forensic-related security controls for the nuclear domain. Results from ongoing prototype developments will be used to demonstrate possible alternative selections and assignments along with their contribution to different security metrics.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Gupta, Deeksha, Edita Bajramovic, Holger Hoppe e Antonio Ciriello. "The Need for Integrated Cybersecurity and Safety Training". In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67330.

Testo completo
Abstract (sommario):
Companies involved in the nuclear energy domain, like component and platform manufacturers, system integrators and utilities, have well established yearly trainings on Nuclear Safety Culture. These trainings are typically covered as part of the annual quality assurance-related refresher trainings, introductory courses for new employees, or indoctrinations of temporary staff. Gradually, security awareness trainings are also addressed on a regular basis, typically with a focus on IT, the daily office work, test bay or construction site work environment, and some data protection and privacy-related topics. Due to emerging national nuclear regulation, steadily but surely, specialized cybersecurity trainings are foreseen for integrators and utilities. Beyond these safety, physical security and cybersecurity specific trainings, there is a need to address the joint part of these disciplines, starting from the planning phase of a new Nuclear Power Plant (NPP). The engineers working on safety, physical protection and cybersecurity, must be aware of these interrelations to jointly elaborate a robust I&C architecture (defense-in-depth, design basis events, functional categorization and systems classification) and a resilient security architecture (security by design, security grading, zone model or infrastructure domain, security conduits, forensic readiness, Security Information and Event Management). This paper provides more in-depth justification of when and where additional training is needed, due to the ubiquitous deployment of digital technology in new NPPs. Additionally, for existing NPPs, the benefits of conveying knowledge by training on specific interfaces between the involved disciplines, will be discussed. Furthermore, the paper will address the need of focused training of management stakeholders, as eventually, they must agree on the residual risk. The decision-makers are in charge of facilitating the inter-disciplinary cooperation in parallel to the allocation of resources, e.g. on security certifications of products, extended modeling-based safety and security analyses and security testing coverage.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Kwon, Sungmoon, Jaehan Jeong e Taeshik Shon. "Digital Forensic Readiness for Financial Network". In 2019 International Conference on Platform Technology and Service (PlatCon). IEEE, 2019. http://dx.doi.org/10.1109/platcon.2019.8669428.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Trenwith, Philip M., e H. S. Venter. "Digital forensic readiness in the cloud". In 2013 Information Security for South Africa. IEEE, 2013. http://dx.doi.org/10.1109/issa.2013.6641055.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Mitha, Yusuf, e HS Venter. "Digital forensic readiness for branchless banking". In 2015 IST-Africa Conference. IEEE, 2015. http://dx.doi.org/10.1109/istafrica.2015.7190578.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Kazadi, Jeff Mutunda, e Husin Jazri. "Using digital forensic readiness model to increase the forensic readiness of a computer system". In 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC). IEEE, 2015. http://dx.doi.org/10.1109/etncc.2015.7184822.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Sibiya, George, Thomas Fogwill, H. S. Venter e Sipho Ngobeni. "Digital forensic readiness in a cloud environment". In AFRICON 2013. IEEE, 2013. http://dx.doi.org/10.1109/afrcon.2013.6757831.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Kyaw, ArKar, Brian Cusack e Raymond Lutui. "Digital Forensic Readiness In Wireless Medical Systems". In 2019 29th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2019. http://dx.doi.org/10.1109/itnac46935.2019.9078005.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Pooe, Antonio, e L. Labuschagne. "A conceptual model for digital forensic readiness". In 2012 Information Security for South Africa (ISSA). IEEE, 2012. http://dx.doi.org/10.1109/issa.2012.6320452.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Van Staden, F. R., e H. S. Venter. "Adding digital forensic readiness to the email trace header". In 2010 Information Security for South Africa (ISSA). IEEE, 2010. http://dx.doi.org/10.1109/issa.2010.5588258.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia