scholarly journals A standardised data acquisition process model for digital forensic investigations

Author(s):  
Reza Montasari
Author(s):  
Joshua I. James ◽  
Ahmed F. Shosha ◽  
Pavel Gladyshev

This chapter aims to be a high-level introduction into the fundamental concepts of both digital forensic investigations and cloud computing for non-experts in one or both areas. Once fundamental concepts are established, this work begins to examine cloud computing security-related questions, specifically how past security challenges are inherited or solved by cloud computing models, as well as new security challenges that are unique to cloud environments. Next, an analysis is given of the challenges and opportunities cloud computing brings to digital forensic investigations. Finally, the Integrated Digital Investigation Process model is used as a guide to illustrate considerations and challenges during an investigation involving cloud environments.


2015 ◽  
pp. 1231-1271
Author(s):  
Joshua I. James ◽  
Ahmed F. Shosha ◽  
Pavel Gladyshev

This chapter aims to be a high-level introduction into the fundamental concepts of both digital forensic investigations and cloud computing for non-experts in one or both areas. Once fundamental concepts are established, this work begins to examine cloud computing security-related questions, specifically how past security challenges are inherited or solved by cloud computing models, as well as new security challenges that are unique to cloud environments. Next, an analysis is given of the challenges and opportunities cloud computing brings to digital forensic investigations. Finally, the Integrated Digital Investigation Process model is used as a guide to illustrate considerations and challenges during an investigation involving cloud environments.


2020 ◽  
Vol 3 (S1) ◽  
Author(s):  
Michael Brand ◽  
Davood Babazadeh ◽  
Carsten Krüger ◽  
Björn Siemers ◽  
Sebastian Lehnhoff

Abstract Modern power systems are cyber-physical systems with increasing relevance and influence of information and communication technology. This influence comprises all processes, functional, and non-functional aspects like functional correctness, safety, security, and reliability. An example of a process is the data acquisition process. Questions focused in this paper are, first, how one can trust in process data in a data acquisition process of a highly-complex cyber-physical power system. Second, how can the trust in process data be integrated into a state estimation to achieve estimated results in a way that it can reflect trustworthiness of that input?We present the concept of an anomaly-sensitive state estimation that tackles these questions. The concept is based on a multi-faceted trust model for power system network assessment. Furthermore, we provide a proof of concept by enriching measurements in the context of the IEEE 39-bus system with reasonable trust values. The proof of concept shows the benefits but also the limitations of the approach.


2017 ◽  
pp. 571-621
Author(s):  
Thomas J. Holt ◽  
Adam M. Bossler ◽  
Kathryn C. Seigfried-Spellar

Sign in / Sign up

Export Citation Format

Share Document