Tesi sul tema "Digital forensic readiness management"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-17 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Digital forensic readiness management".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Kruger, Jaco-Louis. "Digital forensic readiness for IOT devices". Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/73385.
Testo completoDissertation (MSc)--University of Pretoria, 2019.
Computer Science
MSc
Unrestricted
Singh, Avinash. "A Digital Forensic Readiness Approach for Ransomware Forensics". Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/75610.
Testo completoDissertation (MSc)--University of Pretoria, 2019.
Computer Science
MSc (Computer Science)
Unrestricted
Mouton, Francois. "Digital forensic readiness for wireless sensor network environments". Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/24955.
Testo completoDissertation (MSc)--University of Pretoria, 2012.
Computer Science
unrestricted
De, Souza Pedro. "A Chain of findings for digital investigations". Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/40842.
Testo completoDissertation (MSc)--University of Pretoria, 2013.
gm2014
Computer Science
unrestricted
Mankantshu, Mninawe Albert. "Investigating the factors that influence digital forensic readiness in a South African organisation". Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/8504.
Testo completoComputer crimes affect the bottom line of organisations across the globe. The ability of criminals to exploit organisational systems and avoid prosecution is a concern for most organisations. This is due to the increased use of information and communication technology (ICT) by individuals and organisations. The rapid growth of ICT has affected our communication and information exchange. These advances have not only influenced the way we conduct our daily activities, but has also led to new opportunities, risks and challenges for technical and legal structures. Unfortunately, some individuals and groups have decided to use these ICT advances in order to engage in criminal activities, such as cybercrime. The increase of cyber-related crimes puts a lot of pressure on law enforcement agencies and organisations across the globe to produce credible digital forensic evidence.
Pollitt, Mark. "The Hermeneutics of the Hard Drive: Using Narratology, Natural Language Processing, and Knowledge Management to Improve the Effectiveness of the Digital Forensic Process". Doctoral diss., University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/6004.
Testo completoPh.D.
Doctorate
Dean's Office, Arts and Humanities
Arts and Humanities
Texts and Technology
Umurerwa, Janviere, e Maja Lesjak. "AI IMPLEMENTATION AND USAGE : A qualitative study of managerial challenges in implementation and use of AI solutions from the researchers’ perspective". Thesis, Umeå universitet, Institutionen för informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-187810.
Testo completoMacNeil, Tanya. "Police Opinions of Digital Evidence Response Handling in the State of Georgia: An Examination from the Viewpoint of Local Agencies’ Patrol Officers". NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/369.
Testo completoReddy, Kamil. "On digital forensic readiness for information privacy incidents". Thesis, 2012. http://hdl.handle.net/2263/28209.
Testo completoThesis (PhD)--University of Pretoria, 2012.
Computer Science
unrestricted
Pooe, El Antonio. "Developing a multidisciplinary digital forensic readiness model for evidentiary data handling". Thesis, 2018. http://hdl.handle.net/10500/25316.
Testo completoInformation Science
Ph.D. (Information Systems)
Ngobeni, Sipho Josia. "Digital forensic readiness for wireless local area networks". Diss., 2016. http://hdl.handle.net/2263/57497.
Testo completoDissertation (MSc)--University of Pretoria, 2016.
tm2016
Computer Science
MSc
Unrestricted
Grobler, Cornelia Petronella. "DFMF : a digital forensic management framework". Thesis, 2012. http://hdl.handle.net/10210/6365.
Testo completoWe are living in an increasingly complex world in which much of society is dependent on technology and its various offshoots and incarnations (Rogers & Siegfried, 2004). There is ample evidence of the influence of technology on our daily lives. We communicate via e-mail, use chat groups to interact and conduct business by using e-commerce. People relate each other’s existence to a presence on Facebook. The convergence of the products, systems and services of information technology is changing the way of living. The latest smart and cell phones have cameras, applications, and access to social networking sites. These phones contain sensitive information, for example photographs, e-mail, spread sheets, documents, and presentations. The loss of a cell phone therefore may pose a serious problem to an individual or an organisation, when considering privacy and intellectual property issues from an information security (Info Sec) perspective (Pieterse, 2006). Organisations have accepted the protection of information and information assets as a fundamental business requirement and managers are therefore implementing an increasing number of security counter measures, such as security policies, intrusion detection systems, access control mechanisms, and anti-virus products to protect the information and information assets from potential threats. However, incidents still occur, as no system is 100% secure. The incidents must be investigated to determine their root cause and potentially to prosecute the perpetrators (Louwrens, von Solms, Reeckie & Grobler, 2006b). Humankind has long been interested in the connection between cause and event, wishing to know what happened, what went wrong and why it happened. The need for computer forensics emerged when an increasing number of crimes were committed with the use of computers and the evidence required was stored on the computer. In 1984, a Federal Bureau of Investigation (FBI) laboratory began to examine computer evidence (Barayumureeba & Tushabe, 2004), and in 1991 the international association of computer investigation specialists (IACIS) in Portland, Oregon coined the term ‘computer forensics’ during a training session.
Claims, Ivan Prins. "Proposing a maturity assessment model based on the digital forensic readiness commonalities framework". 2013. http://hdl.handle.net/11394/3235.
Testo completoThe purpose of the study described in this thesis was to investigate the structure required to implement and manage digital forensic readiness within an enterprise. A comparative analysis of different digital forensic readiness frameworks was performed and, based on the findings of the analysis, the digital forensic readiness commonalities framework (DFRCF) was extended. The resultant structure was used to design a digital forensic readiness maturity assessment model (DFRMAM) that will enable organisations to assess their forensic readiness. In conclusion, both the extended DFRCF and the DFRMAM are shown to be validated by forensic practitioners, using semi-structured interviews. A qualitative research design and methodology was used to perform a comparative analysis of the various digital forensic readiness frameworks, to comprehend the underlying structures. All the participant responses were recorded and transcribed. Analysis of the findings resulting from the study showed that participants mostly agreed with the structure of the extended DFRCF; however, key changes were introduced to the extended DFRCF. The participants also validated the DFRMAM, and the majority of respondents opted for a checklist-type MAM. Digital forensic readiness is a very sensitive topic since organisations fear that their information might be made public and, as a result, increase their exposure to forensic incidents and reputational risk. Because of this, it was difficult to find participants who have a forensic footprint and are willing, able, and knowledgeable about digital forensic readiness. This study will contribute to the body of knowledge by presenting an original, validated DFRCF and DFRMAM. Practitioners and organisations now have access to non-proprietary DFRMAM.
Bopape, Rudy Katlego. "Towards a unified fraud management and digital forensic framework for mobile applications". Diss., 2015. http://hdl.handle.net/10500/21202.
Testo completoComputing
M. Sc. (Computing)
Arthur, Kweku Kwakye. "Considerations towards the development of a forensic evidence management system". Diss., 2010. http://hdl.handle.net/2263/26567.
Testo completoDissertation (MSc)--University of Pretoria, 2010.
Computer Science
unrestricted
Chou, Po-How, e 邱柏豪. "The study on the capturing digital evidence by forensic tools with enterprise mobility management encryption application based on mobile device". Thesis, 2018. http://ndltd.ncl.edu.tw/handle/9j4589.
Testo completo國立交通大學
管理學院資訊管理學程
106
Recently, the development of information technology and the mobile devices, whether it is in the work, school or various applications in life, it is inseparable from mobile devices and digital information content. The applications developed by mobile devices are widely used in daily life and also used in different fields, including medical, information processing, biometrics, financial transactions, navigation and positioning, and information science. The most popular applications for mobile are communication and email. However, the applications use in phishing, scams, or theft of data. The information-intensive environment, when a digital criminal record is to be verified, it is necessary for a professional digital forensic tool to verify it. However, the rapid development of information security and digital forensics has provided evidence of more evidence and credibility for the standardization and technology of digital forensics in the future. The encrypting applications from mobile, extracting sent and received letters and enterprise applications developed by the company, using digital forensics tools to process and retrieve feature information to identify the correctness of the source and verify the information extracted by the encrypted application. And indirectly understand whether it can provide evidence of favorable evidence and credibility. In the experiments of this paper, test results were obtained through the same forensic tools, mobile device systems, and encryption applications. In summary, the research results show that the evidence ability and credibility evidence provided by the digital forensic tools can be applied legally. However, the encrypted application can protect the enterprise data without being accessed by special permission or tools. And provide the correct digital evidence.
(10711242), Asmett Barrios Morales. "TOWARDS A SHIPYARD 4.0: A CASE STUDY ON THE INTENDED UTILIZATION OF DIGITAL TRANSFORMATION AND INDUSTRY 4.0 MECHANISMS IN A COLOMBIAN SHIPYARD". Thesis, 2021.
Cerca il testo completo