The Information and Communications Technology (ICT) environment constitutes an integral part of our daily lives. Individual computer users and large corporate companies are increasingly dependent on services provided by ICT. These services range from basic communication to managing large databases with corporate client information. Within these ICT environments something is bound to go wrong for a number of reasons, which include an intentional attack on information services provided by an organisation. These organisations have in turn become interested in tracing the root cause of such an incident with the intent of successfully prosecuting a suspected malicious user.Digital forensics has developed significantly towards prosecuting such criminals. The volumes of information and rapid technological developments have contributed to making simple investigations rather cumbersome. In the digital forensics community a number of digital forensic process models have been proposed encapsulating a complete methodology for an investigation. Software developers have also greatly contributed toward the development of digital forensics tools. These developments have resulted in divergent views on digital forensic investigations. This dissertation presents the IDFPM -Integrated Digital Forensic Process Model.The model is presented after examining digital forensic process models within the current academic and law enforcement literature. An adapted sequential logic notation is used to represent the forensic models. The terminology used in the various models is examined and standardised to suit the IDFPM. Finally, a prototype supports a limited selection of the IDFPM processes, which will aid a digital forensic investigator. There are a great many things about architecture that are hidden from the untrained eye.-Frank Gehry Acknowledgements• Thank you God for giving me the strength, wisdom, endurance and the patience to do this, despite the constant challenges.• I would like to thank my mother and father, Gary and Magsie, for their constant support, love and encouragement. Thank you for always listening and giving much needed advice. I would also like to thank my brothers Jonathan and Alexander, and sister Vanessa for their enthusiasm. None of this would have been possible without your support.• Thank you Prof Jan Eloff who has insisted that I complete this milestone in my life.Thank you for pushing me through the difficult times with your knowledge and experience. Thank you Prof Mariki Eloff for your soft and kind words that inspired me to see this through. You have both become great friends in this journey.• Thank you Prof Kourie, Prof Olivier, Prof Venter and Prof Carsten for listening when I asked questions, guiding me toward possible answers. Your help is highly appreciated.• My friends and colleagues in the ICSA lab over the past number of years. Thank you Emmanuel Adigun, Kamil Reddy, Maciej Rossudowski, Marco Slaviero, NeilCroft, Johann Fourie, Francois Mouton, Pedro de Souza and Waldo Delport. You have all tau...
Abstract:In every organisation an information security culture emerges from the way in which people behave towards information and the security thereof. The procedures that employees use in their daily work could represent the weakest link in the information security chain. It is therefore important to develop and improve information security culture through a structured model that addresses employee behaviour. This article will discuss the concept of information security culture and an assessment approach developed to implement and improve such a culture.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.