Database forensic investigation process models: A review

A Al-Dhaqm, S Abd Razak, SH Othman, A Ali… - IEEE …, 2020 - ieeexplore.ieee.org
Database Forensic Investigation (DBFI) involves the identification, collection, preservation,
reconstruction, analysis, and reporting of database incidents. However, it is a …

[HTML][HTML] Addressing insider attacks via forensic-ready risk management

L Daubner, M Macak, R Matulevičius… - Journal of Information …, 2023 - Elsevier
Cyberattacks perpetrated by insiders are difficult to prevent using traditional security
approaches. Often, such attackers misuse legitimate access to the system to conduct an …

[HTML][HTML] Forensic readiness of industrial control systems under stealthy attacks

M Azzam, L Pasquale, G Provan, B Nuseibeh - Computers & Security, 2023 - Elsevier
Abstract Cyberattacks against Industrial Control Systems (ICS) can have harmful physical
impacts. Investigating such attacks can be difficult, as evidence could be lost to physical …

Legal accountability as software quality: A us data processing perspective

TD Breaux, T Norton - 2022 IEEE 30th International …, 2022 - ieeexplore.ieee.org
Software and hardware innovation has led to new consumer products and services with
significant benefits to consumers and society. These advances, however, can come with …

[HTML][HTML] IoT Forensics Readiness-influencing factors

S Friedl, G Pernul - Forensic Science International: Digital Investigation, 2024 - Elsevier
Abstract The Internet of Things (IoT) is increasingly becoming a part of people's lives and is
progressively revolutionizing our lives and businesses. From a Digital Forensics (DF) point …

An improved forensic-by-design framework for cloud computing with systems engineering standard compliance

A Akilal, MT Kechadi - Forensic Science International: Digital Investigation, 2022 - Elsevier
Abstract “Forensic-by-design” is an emergent and ambitious paradigm that extends the
Digital Forensic Readiness (DFR) perspective. Similar to Security-by-design, this new vision …

Forensic experts' view of forensic‐ready software systems: A qualitative study

L Daubner, B Buhnova, T Pitner - Journal of Software …, 2024 - Wiley Online Library
Software engineers widely acknowledge the inclusion of security requirements in the early
stages of the development process. However, the need to prepare the software for the failure …

A model for digital evidence admissibility assessment

A Antwi-Boasiako, H Venter - Advances in Digital Forensics XIII: 13th IFIP …, 2017 - Springer
Digital evidence is increasingly important in legal proceedings as a result of advances in the
information and communications technology sector. Because of the transnational nature of …

Data loss prevention solution for Linux endpoint devices

L Daubner, A Považanec - … of the 18th International Conference on …, 2023 - dl.acm.org
Endpoint data loss prevention (DLP) software monitors and protects data on the endpoint
against accidental and malicious leakage. While the risk of such leakage is widely present in …

Risk-oriented design approach for forensic-ready software systems

L Daubner, R Matulevičius - … of the 16th International Conference on …, 2021 - dl.acm.org
Digital forensic investigation is a complex and time-consuming activity in response to a
cybersecurity incident or cybercrime to answer questions related to it. These typically are …