•  
  •  
 

Prior Publisher

The Association of Digital Forensics, Security and Law (ADFSL)

Abstract

With the evolution in digital technologies, organizations have been forced to change the way they plan, develop, and enact their information technology strategies. This is because modern digital technologies do not only present new opportunities to business organizations but also a different set of issues and challenges that need to be resolved. With the rising threats of cybercrimes, for example, which have been accelerated by the emergence of new digital technologies, many organizations as well as law enforcement agencies globally are now erecting proactive measures as a way to increase their ability to respond to security incidents as well as create a digital forensic ready environment. It is for this reason that, this paper presents the different issues and challenges surrounding the implementation of digital forensic readiness in organizations. The main areas of concentration will be: the different proactive measures that organizations can embrace as a way to increase the ability to respond to security incidents and create a digital forensic ready environment. However, the paper will also look into the issues and challenges pertaining to data retention and disposition in organizations which may also have some effects on the implementation of digital forensic readiness. This is backed up by the fact that although the need for digital forensics and digital evidence in organizations has been explored, as has been the need for digital forensic readiness within organizations, decision-makers still need to understand what is needed within their organizations to ensure effective implementation of digital forensic readiness.

References

Aadil, A., Sameh, A. and Tahar, K., (2015). Cyberspace Forensics Readiness and Security Awareness Model. International Journal of Advanced Computer Science and Applications,(IJACSA)Vol. 6, No. 6. pp.123-127

André, H., (2014). Are you ready? Forensically speaking - On digital forensic readiness. Available at: http://leidensafetyandsecurityblog.nl/articles/are-you-ready-forensically-speaking-on-digital-forensic-readiness [Accessed May 07, 2016].

Antonio P., and Labuschagne, L., (2012). A conceptual model for digital forensic readiness. Proceedings of the ISSA Conference; 2012Aug. 15-17, Johannesburg, SA. IEEE Publishers, 2012; pp.1–8

Antonio P., and Labuschagne, L., (2013). Readiness Planning. Proceedings of the 9th Annual IFIP WG 11.9 International Conference on Digital Forensics. pp.53-66

Antonis, M., Marthie, G., and Chang-Tsun, L., (2011). Digital Forensic Readiness: An Insight into Governmental and Academic Initiatives. IEEE Publishers, 2012; pp.1-8

Barske, D., Stander, A., & Jordaan, J. (2010). A Digital Forensic Readiness Framework for South African SME’s. Proceedings of the ISSA Conference; 2010 Aug. 2–4; Sandton, Johannesburg, SA. Piscataway, NJ: IEEE Computer Society Publishers, 2010;1–6

Benny, L., (2014). Forensic Readiness Plans. Available at: http://www2.deloitte.com/au/en/pages/risk/articles/forensic-readiness-plans.html [Accessed May 07, 2016].

CESG, (2015). Good Practice Guide Forensic Readiness. Issue No: 1.2. Available at: https://www.cesg.gov.uk/content/files/guidance_files/Forensic%20Readiness%20(Good%20Practice%20Guide%2018)_1.2.pdf [Accessed May 07, 2016].

Cobb, M., (2013), "Digital forensic investigation procedure: Form a computer forensics policy", Available at http://www.computerweekly.com/tip/Digital-forensic-investigation-procedure-Form-a-computer-forensics-policy [Accessed February 18, 2013].

Desai, A.M, Fitzgerald, D., Hoanca, B., (2009). Offering a digital forensics course in Anchorage, Alaska. Inform Syst Edu J 2009;7(35); http://isedj.org/7/35/.

EEOC (2017), Development of Impartial and Appropriate Factual Records. Available at: https://www.eeoc.gov/federal/directives/md-110_chapter_6.cfm [Accessed August 16, 2017].

Findlaw (2016). Cyber Crimes. Available at: http://criminal.findlaw.com/criminal-charges/cyber-crimes.html [Accessed June 6, 2016].

Griffin, F., (2014). Forensic Readiness Planning- Available at http://www.griffinforensics.com/forensicreadinessplanning.html#sthash.q3ylEAZf.dpuf [Accessed May 07, 2016].

Grobler, T., and Louwrens, B., (2007). Digital Forensic Readiness as a Component of Information Security Best Practice. In IFIP International Federation for Information Processing, Volume 232, New Approaches for Security, Privacy, and Trust in Complex Environments, eds. Venter, H., Eloff, M., Labuschagne, L., Eloff, J.,von Solms, R., (Boston: Springer), pp. 13-24.

Issam, Z., (2016). Building Digital Forensics Readiness in the Corporate World. Available at: http://www.internalauditor.me/article/building-digital-forensics-readiness-in-the-corporate-world/ [Accessed May 6, 2016].

John, D., (2016).Forensic Readiness Planning. Available at: http://first-response.co.uk/blog/forensic-readiness-planning/ [Accessed May 07, 2016].

Karie, N.M & Kebande, V.R., (2016). Building Ontologies for Digital Forensic Terminologies. International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(2): pp75-82

Karie, N.M. and Venter H.S., (2015).Taxonomy of Challenges for Digital Forensics. Journal Of Forensic Sciences. Vol. 60, No. 4. pp.885–893

Khatir, M., Hejazi, S.M., Sneiders, E., (2008). "Two-Dimensional Evidence Reliability Amplification Process Model for Digital Forensics". Digital Forensics and Incident Analysis, 2008. WDFIA '08. Third International Annual Workshop on Digital Forensics and Incident Analysis. pp.21-29.

Lin, Tom C. W.(2017), Compliance, Technology, and Modern Finance (2016). 11 Brook. J. Corp. Fin. & Com. L. 159 (2016); Temple University Legal Studies Research Paper No. 2017-06. Available at SSRN: https://ssrn.com/abstract=2904664

Mohay, G., (2005), "Technical Challenges and Directions for Digital Forensics", Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 155-161

Ngobeni, S., Venter, H., and Burke, I., (2010). A Forensic Readiness Model For Wireless Networks. Advances In Digital Forensics VI. Pp: 107-117

Reilly, D., Wren, C., Berry, T., (2011). Cloud computing: pros and cons for computer forensic investigations. Int J Multimedia Image Process 2011;1(1):26–34.

Resendez, I., Martinez, P., and Abraham, J., (2012), An introduction to digital forensics. [Online] Available at: http://acetweb.org/journal/ACETJournal_Vol6/An%20Introduction%20to%20Digital%20Forensics.pdf [Accessed May 02, 2016].

Silveira, P., Rodriguez, C., Birukou, A., Casati, F., Daniel, F., D'Andrea, V., Worledge & C., Zouhair, T. (2012), Aiding Compliance Governance in Service-Based Business Processes, IGI Global, pp. 524–548

Sommer, P. (2012). Digital Evidence, Digital Investigation, and E-Disclosure: A Guide to Forensic Readiness, The Information Assurance Advisory Council (IAAC).

Stephanie F.S., (2010)Litigation Holds: Ten Tips in Ten Minutes. aVAILABLE AT: http://www.ned.uscourts.gov/internetDocs/cle/2010-07/LitigationHoldTopTen.pdf [Accessed August 07, 2017].

Unknown (2016). ICT Forensic Readiness Policy Policy. Available at: www.meht.nhs.uk/EasysiteWeb/getresource.axd?AssetID=1892 [Accessed May 6, 2016].

Valjarevic, A. and Venter, H. S., (2013). Implementation guidelines for a harmonised digital forensic investigation readiness process model. Proceedings of Information Security South Africa 2013 Conference, Johannesburg. Pp.1-9.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.