Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Applying a digital forensic readiness framework : three case studies

Tools
- Tools
+ Tools

Mouhtaropoulos, Antonis, Dimotikalis, Panagiotis and Li, Chang-Tsun (2013) Applying a digital forensic readiness framework : three case studies. In: IEEE International Conference on Technologies for Homeland Security (HST), Waltham, MA, 12-14 Nov 2013. Published in: 2013 IEEE International Conference on Technologies for Homeland Security (HST) pp. 217-223. ISBN 9781479939633. doi:10.1109/THS.2013.6699003

[img]
Preview
PDF
WRAP_1060325-cs-060116-97.pdf - Accepted Version - Requires a PDF viewer.

Download (1101Kb) | Preview
Official URL: http://dx.doi.org/10.1109/THS.2013.6699003

Request Changes to record.

Abstract

A digital forensic investigation primarily attempts to reactively respond to an information security incident. While the predominant goal of an investigation is the maintenance of digital evidence of forensic value, little academic research has been conducted on an organization's proactive forensic capability. This capability is referred to as digital forensic readiness and aims to maximize the forensic credibility of digital evidence, while minimizing its post-incident forensic investigation. In this paper, we classify forensic investigation frameworks to expose gaps in proactive forensics research and we review three prominent information security incidents with regard to proactive forensics planning. The applicability of a proactive forensic plan into each incident is then discussed and put into context.

Item Type: Conference Item (Paper)
Subjects: Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software
Divisions: Faculty of Science, Engineering and Medicine > Science > Computer Science
Library of Congress Subject Headings (LCSH): Cyber intelligence (Computer security)
Journal or Publication Title: 2013 IEEE International Conference on Technologies for Homeland Security (HST)
Publisher: IEEE
ISBN: 9781479939633
Book Title: 2013 IEEE International Conference on Technologies for Homeland Security (HST)
Official Date: 2013
Dates:
DateEvent
2013Published
27 July 2013Accepted
Page Range: pp. 217-223
DOI: 10.1109/THS.2013.6699003
Status: Peer Reviewed
Publication Status: Published
Date of first compliant deposit: 14 January 2016
Date of first compliant Open Access: 14 January 2016
Conference Paper Type: Paper
Title of Event: IEEE International Conference on Technologies for Homeland Security (HST)
Type of Event: Conference
Location of Event: Waltham, MA
Date(s) of Event: 12-14 Nov 2013

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us