Applying a Digital forensic readiness framework: Three case studies

Antonis Mouhtaropoulos, Panagiotis Dimotikalis, Chang Tsun Li

    Research output: Book chapter/Published conference paperConference paperpeer-review

    10 Citations (Scopus)

    Abstract

    A digital forensic investigation primarily attempts to reactively respond to an information security incident. While the predominant goal of an investigation is the maintenance of digital evidence of forensic value, little academic research has been conducted on an organization's proactive forensic capability. This capability is referred to as digital forensic readiness and aims to maximize the forensic credibility of digital evidence, while minimizing its post-incident forensic investigation. In this paper, we classify forensic investigation frameworks to expose gaps in proactive forensics research and we review three prominent information security incidents with regard to proactive forensics planning. The applicability of a proactive forensic plan into each incident is then discussed and put into context.
    Original languageEnglish
    Title of host publicationProceedings of 2013 IEEE International Conference on Technologies for Homeland Security (HST)
    PublisherIEEE, Institute of Electrical and Electronics Engineers
    Pages217-223
    Number of pages7
    DOIs
    Publication statusPublished - 2013
    Event2013 IEEE International Conference on Technologies for Homeland Security (HST) - Westin Hotel, Waltham, United States
    Duration: 12 Nov 201314 Nov 2013
    https://web.archive.org/web/20130410081412/http://ieee-hst.org/ (Archived page)

    Conference

    Conference2013 IEEE International Conference on Technologies for Homeland Security (HST)
    Country/TerritoryUnited States
    CityWaltham
    Period12/11/1314/11/13
    OtherThe 13th annual IEEE Conference on Technologies for Homeland Security (HST ’13), will be held 12 - 14 November in Greater Boston, Massachusetts. This conference brings together innovators from leading academic, industry, business, Homeland Security Centers of Excellence, and government programs to provide a forum to discuss ideas, concepts, and experimental results.
    Internet address

    Fingerprint

    Dive into the research topics of 'Applying a Digital forensic readiness framework: Three case studies'. Together they form a unique fingerprint.

    Cite this