A conceptual model for digital forensic readiness

作者: Antonio Pooe , L Labuschagne

DOI: 10.1109/ISSA.2012.6320452

关键词:

摘要: The ever-growing threats of fraud and security incidents present many challenges to law enforcement organisations across the globe. This has given rise need for build effective incident management strategies, which will enhance company's reactive capability incidents. aim this paper is propose proactive activities an organisation can undertake in order increase its ability respond create a digitally forensic ready workplace environment. study constitutes exploratory research, with use systematic literature review as basis identify relating environment.While much been written about how prepare incidents, findings show absence digital readiness model. concludes by presenting such conceptual contributes greater body knowledge on design implementation programme, aimed at maximising evidence organisation.

参考文章(22)
William Bradley Glisson, Sheona Anne Hoolachan, Organizational Handling of Digital Evidence Proceedings of the Conference on Digital Forensics, Security and Law. pp. 33- 44 ,(2010)
Robert Rowlingson, A Ten Step Process for Forensic Readiness. International Journal of Digital Evidence. ,vol. 2, ,(2004)
Littlejohn Shinder, Michael Cross, Understanding Cybercrime Prevention Scene of the Cybercrime. pp. 505- 554 ,(2008) , 10.1016/B978-1-59749-276-8.00012-1
C P Grobler, C P Louwrens, Digital Forensic Readiness as a Component of Information Security Best Practice information security conference. pp. 13- 24 ,(2007) , 10.1007/978-0-387-72367-9_2
Graeme Bell, Richard Boddington, Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery? The Journal of Digital Forensics, Security and Law. ,vol. 5, pp. 1- ,(2010) , 10.15394/JDFSL.2010.1078
Sebastiaan Solms, Cecil Louwrens, Colette Reekie, Talania Grobler, A Control Framework for Digital Forensics IFIP Advances in Information and Communication Technology. ,vol. 222, pp. 343- 355 ,(2006) , 10.1007/0-387-36891-4_27
Brian D. Carrier, Risks of live digital forensic analysis Communications of the ACM. ,vol. 49, pp. 56- 61 ,(2006) , 10.1145/1113034.1113069
Iain Sutherland, Jon Evans, Theodore Tryfonas, Andrew Blyth, Acquiring volatile operating system data tools and techniques ACM SIGOPS Operating Systems Review. ,vol. 42, pp. 65- 73 ,(2008) , 10.1145/1368506.1368516
Trevor Lamis, A forensic approach to incident response information security curriculum development. pp. 177- 185 ,(2010) , 10.1145/1940941.1940975