Assessing forensic readiness

نویسندگان

  • Anargyros Chryssanthou
  • Vasilios Katos
چکیده

In this paper we argue that optimization in terms of forensic readiness should be performed in a controlled and structured manner, taking under consideration the current situation an organization is in. We reflect upon well known practices relating to process maturity and investigate the feasibility and appropriateness of adopting such approaches in order to express forensic readiness. Levels of forensic readiness are defined by using a 0 to 5 scale. By using a fictitious example of an organization’s website, which suffers a security breach, we examine how forensically ready the organization is. From this exercise we conjecture that an organization cannot develop or adopt solely generic forensic readiness assessment practices, but there is a need for tailoring.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

XBRL-Trail --- A model for introducing digital forensic readiness to XBRL

Business is reliant on Information Technology to process and share financial data. Proprietary formats often hinder the sharing of financial data as stakeholders can not uniformly read or access the data. As a result, XBRL (The eXtensible Business Reporting Language) was developed to address the information sharing issue, and is rapidly becoming the standard format for financial data. XBRL does...

متن کامل

A Ten Step Process for Forensic Readiness

A forensic investigation of digital evidence is commonly employed as a post-event response to a serious information security incident. In fact, there are many circumstances where an organisation may benefit from an ability to gather and preserve digital evidence before an incident occurs. Forensic readiness is defined as the ability of an organisation to maximise its potential to use digital ev...

متن کامل

NMBaaS (Non-Malicious Botnet as a service): Achieving Digital forensic Readiness in a private cloud using NMBaaS

The pervasiveness of the Internet, increased number of devices and the dissemination of ICT have played a big role in the increase in number of security incidents and adversaries in the cloud. However, there are limited proactive strategies that can enable mitigation of these incidents given the distributed nature of cloud resources. Therefore, the primary aim of the work described in this prop...

متن کامل

Implementing Forensic Readiness Using Performance Monitoring Tools

This paper proposes the use of monitoring tools to record data in support of digital forensic investigations. The collection of live system data requires integrity checks and data validation to be performed as the data is collected and stored. Combining system monitoring and digital forensic functionality in a single system reduces the cost and complexity of administration and maintenance, whil...

متن کامل

Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems

The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates [18]. PKI systems are today one of the most accepted and used technologies to enable successful implementation of information systems security services such as authentication and confidentiality. Digital forensics is a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012