Forensic Investigative Process for Situational Awareness in Information Security

Author(s):  
Khidir Mohamed Ali ◽  
Thomas Owens

As a starting point for the development of a common visualization of the forensics process by the members of an investigating team, this chapter provides algorithms that provide guidance and step by step instructions on how to deal with computer forensics and the investigations they carry out. A general introductory overview of computer forensics is provided, and the framework of a forensic investigation is summarized. On the basis of this framework, three algorithms are provided, one for each phase of a forensic investigation, which cover the different aspects of computer forensics and address key elements to be considered when attacked systems are investigated.

2021 ◽  
Vol 13 (12) ◽  
pp. 6750
Author(s):  
Andreja Mihailović ◽  
Julija Cerović Smolović ◽  
Ivan Radević ◽  
Neli Rašović ◽  
Nikola Martinović

The main idea of this research is to examine how teleworking has affected employee perceptions of organizational efficiency and cybersecurity before and during the COVID-19 pandemic. The research is based on an analytical and empirical approach. The starting point of the research is a critical and comprehensive analysis of the relevant literature regarding the efficiency of organizations due to teleworking, digital information security, and cyber risk management. The quantitative approach is based on designing a structural equation model (SEM) on a sample of 1101 respondents from the category of employees in Montenegro. Within the model, we examine simultaneously the impact of their perceptions on the risks of teleworking, changes in cyber-attacks during teleworking, organizations’ capacity to respond to cyber-attacks, key challenges in achieving an adequate response to cyber-attacks, as well as perceptions of key challenges related to cybersecurity. The empirical aspects of our study involve constructing latent variables that correspond to different elements of employee perception; namely, their perception of organizational efficiency and the extent to which the digital information security of their organizations has been threatened during teleworking during the pandemic.


Author(s):  
Estera Pietras

Due to the exchange of information, organizations are encouraged to create an effective system of information flow that should be monitored on a regular basis in order to minimize the risk of emergence of threats. Due to modern technical solutions of security systems, it is much more possible and accessible than a few years ago. For this purpose, proper identification and classification of threats is necessary. This constitutes the starting point for considering the role and the essence of risk. The article highlights the aspects related to ensuring information security as a whole and data protection- the most important assets of business entities.


2020 ◽  
pp. 113-128
Author(s):  
Jesper Gulddal

This chapter on Dashiell Hammett’s The Dain Curse takes a narratively unmotivated car accident as the starting point for a discussion of genre negation as a force of innovation in Hammett’s writing. As a violent interruption of preestablished modes of operation, the accident embodies the way in which the novel relates to the conventions of popular fiction only to wreck and overturn them. Thus, the linearity of the investigative process is replaced with a circular structure; the purity of genre is replaced with references to a catalogue of popular fiction templates, none of which are fully executed; narrative closure is replaced with ambiguity and contingency; and the classic figure of the ‘sidekick’ is literarily blown to pieces in what Gulddal reads as another emblematic representation of the principle of genre mobility.


2019 ◽  
Vol 2019 ◽  
pp. 1-12
Author(s):  
René W. Fléron

The CubeSat DTUsat-2 was designed and built by students and faculty at the Technical University of Denmark and launched to low earth orbit on June 2014. Its mission was to aid ornithologists in bird migration research. Shortly after launch and orbit injection, it became apparent that all was not nominal. To understand the problem and find the causes, a forensic investigation was initiated. The investigation used recorded Morse-encoded beacons emitted by the satellite as a starting point. This paper presents the real-life data from DTUsat-2 on orbit and the methodologies used to visualize the key element in the investigation, namely, the correlation between orbit position and the beacon counter. Based on the data presented, an explanation for the observed behaviour of DTUsat-2 is given.


Genes ◽  
2021 ◽  
Vol 12 (11) ◽  
pp. 1739
Author(s):  
Tunde I. Huszar ◽  
Katherine B. Gettings ◽  
Peter M. Vallone

The top challenges of adopting new methods to forensic DNA analysis in routine laboratories are often the capital investment and the expertise required to implement and validate such methods locally. In the case of next-generation sequencing, in the last decade, several specifically forensic commercial options became available, offering reliable and validated solutions. Despite this, the readily available expertise to analyze, interpret and understand such data is still perceived to be lagging behind. This review gives an introductory overview for the forensic scientists who are at the beginning of their journey with implementing next-generation sequencing locally and because most in the field do not have a bioinformatics background may find it difficult to navigate the new terms and analysis options available. The currently available open-source and commercial software for forensic sequencing data analysis are summarized here to provide an accessible starting point for those fairly new to the forensic application of massively parallel sequencing.


Author(s):  
Janne Merete Hagen

The chapter gives an overview of business practices and how people and human relations influence situational awareness and information security in an organization. There is still a long way to go in training employees in information security and improving employees’ information security awareness. Motivated and trained employees have the ability to detect and report security weaknesses and breaches, including near-miss incidents, and in this way, they may provide a valuable defense-in-depth-capability that is often lacking. The chapter discusses two approaches to overcome the barriers to building situational awareness promulgated in the general deterrence theory and socio-technical theory.


2014 ◽  
Vol 496-500 ◽  
pp. 2208-2215 ◽  
Author(s):  
Zhong Yong Fu ◽  
Zhen Zhou Zhao

With the popularity of computer and network technology, information security problem is increasingly highlighted, and the computer related crime phenomenon more and more. Computer forensics to protect information security and to crack down on computer crime provides scientific methods and means, can provide evidence of the court need. This paper first gives the definition of computer forensics, and then introduces the features of computer evidence, principles and classification of computer forensics, finally describes the research status of computer forensics, points out the problems existing in the computer forensics and its development trend is forecasted.


2017 ◽  
Vol 12 (1) ◽  
pp. 48-71
Author(s):  
M. A. Voznyuk ◽  
Yu. A. Denisov

The analytical review examines the issues of forensic investigation into the circumstances of production of digital video and audio recordings. The paper presents the organization and lines of inquiry in forensic analysis of video and audio evidence, computer forensics, forensic linguistics, and psychological evaluation established in the system of forensic science organizations of the Russian Ministry of Justice by 2013–2016. The analysis covers the issues of independent or integrated application of the listed types of special knowledge in order to meet the discipline-specific and comprehensive objectives of determining the circumstances of video/audio production. General strategies and types of forensic diagnostics of production circumstances are discussed without too much emphasis on the methodological minutiae of every stage of the investigation.


Sign in / Sign up

Export Citation Format

Share Document