2015
DOI: 10.14569/ijacsa.2015.060617
|View full text |Cite
|
Sign up to set email alerts
|

Cyberspace Forensics Readiness and Security Awareness Model

Abstract: Abstract-The goal of reaching a high level of security in wire-less and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs). However, these logs are increasingly becoming an obstacle for network administrators in analyzing networks for malicious activities. Forensic inve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…The idea behind this approach is to identify the evidence collection path (ECP) by using evidence collection process model (ECPM). ECPM functions are divided based on the phases in the Cybercrime that has been discussed in [13].…”
Section: Prediction Investigation Approach By Using Ecpmmentioning
confidence: 99%
“…The idea behind this approach is to identify the evidence collection path (ECP) by using evidence collection process model (ECPM). ECPM functions are divided based on the phases in the Cybercrime that has been discussed in [13].…”
Section: Prediction Investigation Approach By Using Ecpmmentioning
confidence: 99%
“…To authenticate evidence, it might also be essential to evaluate its reliability. There are two general methods to evaluating whether evidence can be trusted upon in court [16].The first method is to focus on whether the device that generated the evidence was operative normally without any single issue, and the other method is to examine the actual evidence for manipulation [17].…”
Section: Previous Workmentioning
confidence: 99%
“…METHODOLOGY Figure 4 shows Network Forensics Readiness and Security Awareness Framework. This framework contains fifteen different software and database blocks, these blocks work as single unit in order to forensically process and normalize the captured event-logs that have been discussed in [17]. In order to be able to generate an admissible forensics report to the court of Justice we have to clean our event-logs repository from any duplication and irrelevant information.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors [31], [32] proposed the forensics readiness and awareness framework to reconstruct a cybercrime scenario that was previously observed. The proposed framework that contains fifteen different software and database blocks.…”
Section: Decriminalising Anonymous and Pseudonymousmentioning
confidence: 99%