Forensic Computing Theory & Practice: Towards developing a methodology for a standardised approach to Computer misuse
نویسندگان
چکیده
The increasing risk and incidence of computer misuse has raised awareness in the public and private sectors of the need to develop defensive and offensive responses. There is now widespread recognition of the importance of specialised forensic computing investigation (FCI) teams able to operate across conventional boundaries of law enforcement and national defence. More specifically, recent research on Australian FCI teams has revealed the critical role of investigative skills alongside digital evidence acquisition and presentation competences. At the level of practice these investigative skills extend beyond a methodical approach, to include case management, critical thinking and sensitivity to the corroborative importance of non-digital evidence. This paper considers the implications of these practical insights for forensic computing theory and presents a matrix for classifying behaviours and types of computer misuse. It also examines the European CTOSE methodology and reflects on how it is re-contextualised by these insights derived from FCI practice. It is anticipated that this paper will contribute towards the development of a standardised and comprehensive forensic approach to computer misuse.
منابع مشابه
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملThe Feasibility and Applicability of Grounded Theory Methodology in Translation Studies: Developing Translator Competence
The development of sociological approach to the study of translation makes it possible for the researchers to adopt different methodology to develop new theoretical formulations and concepts. These formulations are arrived at through the interaction with those being studied through the interpretation of real social world and meanings of the participants involved in the translation/social event....
متن کاملA New Model Representation for Road Mapping in Emerging Sciences: A Case Study on Roadmap of Quantum Computing
One of the solutions for organizations to succeed in highly competitive markets is to move toward emerging sciences. These areas provide many opportunities, but, if organizations do not meet requirements of emerging sciences, they may fail and eventually, may enter a crisis. In this matter, one of the important requirements is to develop suitable roadmaps in variety fields such as strategic, ca...
متن کاملComputer Forensics for Graduate Accountants: A Motivational Curriculum Design Approach
Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forens...
متن کامل