scholarly journals Framework of Confidence Values during Digital Forensic Investigation Processes

The advancement of Internet of Things (IoT) devices is continuously progressing and such development also enables a number of issues to arise which increases the complexity in the forensic investigation of the IoT. Globally, investigators are faced with challenges in ways of retrieving evidence from the different areas of the IoT environment, which includes Devices, Networks and the Cloud. One of the most crucial steps during forensic investigations is the writing up and creation of a case report which then needs to be presented in the court of law. In this paper, we propose models to estimate the confidence values of evidence, investigators and case reports to ensure case investigation accuracy and improve the evidential values of case presentation as well as evidence sharing of sensitive data worldwide.

Considering the large number of devices connected to the Internet of Things(IoT), identifying malicious devices for the purpose of “search & seizure” remainsa critical issue for digital investigators. Consequently, the need for techniques that automatically identify malicious devices can speed up the process of digital investigation. However, few conceptual approaches were proposed to identify malicious devices during IoT forensic investigation. To overcome that, a formal approach is proposed to automatically triage and fingerprint IoT Malicious devices with their respective states. It is expected that with the proposed formal approach, investigators can simply identify malicious devices, their states as well as determine the scope of investigation.


2018 ◽  
Vol 2018 ◽  
pp. 1-3 ◽  
Author(s):  
Esha M. Kapania ◽  
Christina Link ◽  
Joshua M. Eberhardt

Background. Chilaiditi syndrome is a phenomenon where there is an interposition of the colon between the liver and the abdominal wall leading to clinical symptoms. This is distinct from Chilaiditi sign for which there is radiographic evidence of the interposition, but is asymptomatic. Case Presentation. Here, we present the case of a patient who, despite having clinical symptoms for a decade, had a delayed diagnosis presumably due to the interposition being intermittent and episodic. Conclusions. This case highlights the fact that Chilaiditi syndrome may be intermittent and episodic in nature. This raises an interesting question of whether previous case reports, which describe complete resolution of the syndrome after nonsurgical intervention, are perhaps just capturing periods of resolution that may have occurred spontaneously. Because the syndrome may be intermittent with spontaneous resolution and then recurrence, patients should have episodic follow-up after nonsurgical intervention.


2022 ◽  
Vol 12 (2) ◽  
pp. 730
Author(s):  
Funmilola Ikeolu Fagbola ◽  
Hein Venter

Internet of Things (IoT) is the network of physical objects for communication and data sharing. However, these devices can become shadow IoT devices when they connect to an existing network without the knowledge of the organization’s Information Technology team. More often than not, when shadow devices connect to a network, their inherent vulnerabilities are easily exploited by an adversary and all traces are removed after the attack or criminal activity. Hence, shadow connections pose a challenge for both security and forensic investigations. In this respect, a forensic readiness model for shadow device-inclusive networks is sorely needed for the purposes of forensic evidence gathering and preparedness, should a security or privacy breach occur. However, the hidden nature of shadow IoT devices does not facilitate the effective adoption of the most conventional digital and IoT forensic methods for capturing and preserving potential forensic evidence that might emanate from shadow devices in a network. Therefore, this paper aims to develop a conceptual model for smart digital forensic readiness of organizations with shadow IoT devices. This model will serve as a prototype for IoT device identification, IoT device monitoring, as well as digital potential evidence capturing and preservation for forensic readiness.


2021 ◽  
Author(s):  
Kanta Hori ◽  
Shota Yamamoto ◽  
Maki Kosukegawa ◽  
Noboru Yamashita ◽  
Yuichiro Shinno

Abstract Background: Nutcracker syndrome (NCS) refers to compression of the left renal vein (LRV) between the aorta and superior mesenteric artery (SMA), which results in renal venous hypertension and its resultant clinical manifestations. Left renal vein thrombus (LRVT) complicating NCS is relatively rare. To the best of our knowledge, there are only four case reports of LRVT complicating NCS. Furthermore, there are no reports of pulmonary thromboembolism (PTE) caused by NCS. Herein, we describe a rare case of NCS causing LRVT and PTE and its clinical management. Case Presentation: A 40-year-old man was admitted to our hospital with acute left flank pain. Computed tomography angiography (CTA) revealed compression of the LRV between the aorta and the SMA with an LRVT. Furthermore, CTA revealed bilateral PTE. Rivaroxaban was administered as an anticoagulant. Twenty days after initiation, CTA revealed complete resolution of PTE and LRVT, and repeat CTA at 3 and 6 months showed no recurrence. Conclusions: This case report demonstrates that NSC may be a possible cause of LRVT and PTE. We review the reported cases of NCS complicated by LRVT and discuss the imaging modalities for NCS.


Author(s):  
Diane Barrett

Cloud computing environments add an inherent layer of complication to a digital forensic investigation. The content of this chapter explores current forensic acquisition processes, why current processes need to be modified for cloud investigations, and how new methods can help in an investigation. A section will be included that provides recommendations for more accurate evidence acquisition in investigations. A final section will include recommendations for additional areas of research in the area of investigating cloud computing environments and acquiring cloud computing-based evidence.


Sign in / Sign up

Export Citation Format

Share Document