5,068 research outputs found
On the Scientific Maturity of Digital Forensics Research
In this paper we transfer a well-known grade schema of scientific maturity from the domain of software engineering into the domain of digital forensics research. On the basis of this maturity schema and its grades we classify the current state of maturity in the research field of digital forensics, and we argue for more efforts towards higher levels of scientificness in this still new field of research.http://link.springer.com/chapter/10.1007/978-3-642-41148-9_3mv201
DF-C²M²:a comprehensive capability maturity model for digital forensics organisations
The field of digital forensics has grown from an obscure area of interest amongst computer enthusiasts to become an emerging forensic scientific discipline of great significance in criminal investigations and civil litigations across the globe. The majority of digital forensic laboratories today are faced with ever-increasing legal and regulatory demands to meet internationally accepted rules regarding the admissibility of digital evidence, as well as being faced with various pending regulatory mandates requiring international accreditation of digital forensic facilities. These two major requirements, coupled with ever-increasing case backlogs and limited resources, have left many digital forensic labs to confront what initially seems to be an ‘insurmountable challenge’ to manage their caseloads, implement new regulatory requirements, and still find ways to improve overall efficiency and effectiveness. Based on the Capability Maturity Model (CMM) paradigms, the Digital Forensics - Comprehensive Capability Maturity Model (DF-C²M²) was born out of the findings of this research and the scientific gap that exists in the current digital forensics standards, best practices, frameworks, and models. This model has been developed through consultations and interviews with digital forensics experts. The DF-C²M² enables the measurement of maturity along three key organisational dimensions: people, processes, and tools, while enabling such an assessment to be tailored to a particular type of organisation, e.g., law enforcement or non-law enforcement. The inclusion of capability maturity across multiple key domains is designed to provide a more comprehensive capability maturity assessment of an organisation – across its three inter-dependants ‘influencer’ domains, when compared with other capability maturity models that focus on only specific domains such as processes, or on a sub-element of a domain. The model has been tested and evaluated as a management support and Capability Maturity Assessment system within two labs. One of the labs is an ISO 17025 accredited digital forensic lab within a law enforcement agency, while the other one is a non-accredited lab within an academic institute. The model will also serve as a stepping stone towards a timelier, more effective, and more efficient means of developing and implementing digital forensic standards and best practices moving forward. In summary, the DF-C²M² was designed to address the cited challenges by creating a modular management decision support framework to enable labs to better manage and achieve their objectives through a system of assessments and planning tools all geared towards measuring compliance and Capability Maturity across multiple domains
Cyber security investigation for Raspberry Pi devices
Big Data on Cloud application is growing rapidly. When the cloud is attacked, the investigation relies on digital forensics evidence. This paper proposed the data collection via Raspberry Pi devices, in a healthcare situation. The significance of this work is that could be expanded into a digital device array that takes big data security issues into account. There are many potential impacts in health area. The field of Digital Forensics Science has been tagged as a reactive science by some who believe research and study in the field often arise as a result of the need to respond to event which brought about the needs for investigation; this work was carried as a proactive research that will add knowledge to the field of Digital Forensic Science.
The Raspberry Pi is a cost-effective, pocket sized computer that has gained global recognition since its development in 2008; with the wide spread usage of the device for different computing purposes. Raspberry Pi can potentially be a cyber security device, which can relate with forensics investigation in the near future. This work has used a systematic approach to study the structure and operation of the device and has established security issues that the widespread usage of the device can pose, such as health or smart city. Furthermore, its evidential information applied in security will be useful in the event that the device becomes a subject of digital forensic investigation in the foreseeable future. In healthcare system, PII (personal identifiable information) is a very important issue. When Raspberry Pi plays a processor role, its security is vital; consequently, digital forensics investigation on the Raspberry Pies becomes necessary
A Review on Software Quality Forensics: Techniques, Challenges, and Limitations
Software quality forensics plays a vibrant role related to software quality, security, and integrity. The paper aims to derive a software quality forensics model through existing software quality models and their factors. The papers explore quality models, factors, approaches, tools, techniques, and standards regarding software quality investigation and confine the research area for software quality integrity breach forensics. The explore the deviations of quality attributes, standards, factors, and artifacts, it leads to further investigation of root-cause followed by digital evidence procedure for alleged software quality issues. Therefore, there is a need for a software quality forensics model and dedicated standards to fulfill the digital evidence procedure validation, satisfiable, and prosecution in the court of law in the context of alleged or illegal activity investigation quality of software. The paper has derived the techniques, challenges, and limitations of software quality forensics based on the review of research questions
A Revised Forensic Process for Aligning the Investigation Process with the Design of Forensic-Enabled Cloud Services
© Springer Nature Switzerland AG 2020. The design and implementation of cloud services, without taking under consideration the forensic requirements and the investigation process, makes the acquisition and examination of data, complex and demanding. The evidence gathered from the cloud may not become acceptable and admissible in the court. A literature gap in supporting software engineers so as to elicit and model forensic-related requirements exists. In order to fill the gap, software engineers should develop cloud services in a forensically sound manner. In this paper, a brief description of the cloud forensic-enabled framework is presented (adding some new elements) so as to understand the role of the design of forensic-enabled cloud services in a cloud forensic investigation. A validation of the forensic requirements is also produced by aligning the stages of cloud forensic investigation process with the framework’s forensic requirements. In this way, on one hand, a strong relationship is built between these two elements and emphasis is given to the role of the forensic requirements and their necessity in supporting the investigation process. On the other hand, the alignment assists towards the identification of the degree of the forensic readiness of a cloud service against a forensic investigation
Smartphone Forensic Challenges
Article originally published in Internation Journal of Computer Science and SecurityGlobally, the extensive use of smartphone devices has led to an increase in storage and transmission of enormous volumes of data that could be potentially be used as digital evidence in a forensic investigation. Digital evidence can sometimes be difficult to extract from these devices given the various versions and models of smartphone devices in the market. Forensic analysis of smartphones to extract digital evidence can be carried out in many ways, however, prior knowledge of smartphone forensic tools is paramount to a successful forensic investigation. In this paper, the authors outline challenges, limitations and reliability issues faced when using smartphone device forensic tools and accompanied forensic techniques. The main objective of this paper is intended to be consciousness-raising than suggesting best practices to these forensic work challenges
Public Security & Digital Forensics in the United States: The Continued Need for Expanded Digital Systems for Security
Digital Forensics is one of the latest challenges for the use of forensics in the investigative process in the United States. Some of the challenges are created by conditions and circumstances present for law enforcement around the world. However, many are unique to the United States and created by the standards of evidence within our courts, nature of our law enforcement organizations, and structure of our judicial and prosecutorial systems. It is essential for the preservation of public security and individual safety that competent systems of digital forensics are developed for law enforcement at all levels. The failure to do so will let the guilty avoid responsibility for their criminal actions while possibly subjecting the innocent to unprecedented government intrusion into their private lives
- …