Database forensic investigation process models: A review
Database Forensic Investigation (DBFI) involves the identification, collection, preservation,
reconstruction, analysis, and reporting of database incidents. However, it is a …
reconstruction, analysis, and reporting of database incidents. However, it is a …
[HTML][HTML] Addressing insider attacks via forensic-ready risk management
Cyberattacks perpetrated by insiders are difficult to prevent using traditional security
approaches. Often, such attackers misuse legitimate access to the system to conduct an …
approaches. Often, such attackers misuse legitimate access to the system to conduct an …
[HTML][HTML] Forensic readiness of industrial control systems under stealthy attacks
Abstract Cyberattacks against Industrial Control Systems (ICS) can have harmful physical
impacts. Investigating such attacks can be difficult, as evidence could be lost to physical …
impacts. Investigating such attacks can be difficult, as evidence could be lost to physical …
Legal accountability as software quality: A us data processing perspective
TD Breaux, T Norton - 2022 IEEE 30th International …, 2022 - ieeexplore.ieee.org
Software and hardware innovation has led to new consumer products and services with
significant benefits to consumers and society. These advances, however, can come with …
significant benefits to consumers and society. These advances, however, can come with …
[HTML][HTML] IoT Forensics Readiness-influencing factors
Abstract The Internet of Things (IoT) is increasingly becoming a part of people's lives and is
progressively revolutionizing our lives and businesses. From a Digital Forensics (DF) point …
progressively revolutionizing our lives and businesses. From a Digital Forensics (DF) point …
An improved forensic-by-design framework for cloud computing with systems engineering standard compliance
A Akilal, MT Kechadi - Forensic Science International: Digital Investigation, 2022 - Elsevier
Abstract “Forensic-by-design” is an emergent and ambitious paradigm that extends the
Digital Forensic Readiness (DFR) perspective. Similar to Security-by-design, this new vision …
Digital Forensic Readiness (DFR) perspective. Similar to Security-by-design, this new vision …
Forensic experts' view of forensic‐ready software systems: A qualitative study
Software engineers widely acknowledge the inclusion of security requirements in the early
stages of the development process. However, the need to prepare the software for the failure …
stages of the development process. However, the need to prepare the software for the failure …
A model for digital evidence admissibility assessment
A Antwi-Boasiako, H Venter - Advances in Digital Forensics XIII: 13th IFIP …, 2017 - Springer
Digital evidence is increasingly important in legal proceedings as a result of advances in the
information and communications technology sector. Because of the transnational nature of …
information and communications technology sector. Because of the transnational nature of …
Data loss prevention solution for Linux endpoint devices
L Daubner, A Považanec - … of the 18th International Conference on …, 2023 - dl.acm.org
Endpoint data loss prevention (DLP) software monitors and protects data on the endpoint
against accidental and malicious leakage. While the risk of such leakage is widely present in …
against accidental and malicious leakage. While the risk of such leakage is widely present in …
Risk-oriented design approach for forensic-ready software systems
L Daubner, R Matulevičius - … of the 16th International Conference on …, 2021 - dl.acm.org
Digital forensic investigation is a complex and time-consuming activity in response to a
cybersecurity incident or cybercrime to answer questions related to it. These typically are …
cybersecurity incident or cybercrime to answer questions related to it. These typically are …