Journal•ISSN: 2305-0012
International Journal of Cyber-Security and Digital Forensics
The Society of Digital Information and Wireless Communications (SDIWC)
About: International Journal of Cyber-Security and Digital Forensics is an academic journal. The journal publishes majorly in the area(s): Information system & Wireless. It has an ISSN identifier of 2305-0012. Over the lifetime, 216 publications have been published receiving 1072 citations.
Papers
More filters
•
TL;DR: Development trends in computer forensics and security in various aspects are looked into to determine the trend of solutions in these aspects and evaluate their effectiveness in resolving the aforementioned issues.
Abstract: Privacy issues have always been a major concern in
computer forensics and security and in case of any
investigation whether it is pertaining to computer or
not always privacy issues appear. To enable
privacy’s protection in the physical world we need
the law that should be legislated, but in a digital
world by rapidly growing of technology and using
the digital devices more and more that generate a
huge amount of private data it is impossible to
provide fully protected space in cyber world
during the transfer, store and collect data. Since its
introduction to the field, forensics investigators,
and developers have faced challenges in finding the
balance between retrieving key evidences and
infringing user privacy. This paper looks into
developmental trends in computer forensics and
security in various aspects in achieving such a
balance. In addition, the paper analyses each
scenario to determine the trend of solutions in these
aspects and evaluate their effectiveness in resolving
the aforementioned issues.
63 citations
•
TL;DR: Trends of applications of digital forensics and security at hand in various aspects are looked into and some estimations about future research trends in this area are provided.
Abstract: Nowadays, rapid evolution of computers and mobile phones has caused these devices to be used in criminal activities. Providing appropriate and sufficient security measures is a difficult job due to complexity of devices which makes investigating crimes involving these devices even harder. Digital forensic is the procedure of investigating computer crimes in the cyber world. Many researches have been done in this area to help forensic investigation to resolve existing challenges. This paper attempts to look into trends of applications of digital forensics and security at hand in various aspects and provide some estimations about future research trends in this area.
51 citations
••
TL;DR: The evolution of the digital forensic; its origins, its current position and its future directions are studied, followed by the assessment and analysis of current state of art in both industrial and academic digital forensics research.
Abstract: 1. ABSTRACT Digital forensic has evolved from addressing minor computer crimes to investigation of complex international cases with massive effect on the world. This paper studies the evolution of the digital forensic; its origins, its current position and its future directions. This paper sets the scene with exploring past literature on digital forensic approaches followed by the assessment and analysis of current state of art in both industrial and academic digital forensics research. The obtained results are compared and analyzed to provide a comprehensive view of the current digital forensics landscape. Furthermore, this paper highlights critical digital forensic issues that are being overlooked and not being addressed as deserved. The paper finally concludes with offering future research directions in this area.
35 citations
•
TL;DR: The proposed cloud computing architecture would be available to individuals and organizations, large and small, and operate on the same pattern as other public utilities, namely: • Subscribers sign up for service from a service provider, on a contractual basis, and the service provider delivers services of data processing, data access and data storage to subscribers.
Abstract: KEYWORDS Cloud computing, cyber security metrics, mean failure cost, security requirements, security threats, threats classification . 1 INTRODUCTION With the rapid development of processing and storage technologies and the emergence of the Internet, computing resources have become cheaper, more powerful and more ubiquitously available than ever before. As a consequence, IT service providers are faced to challenges of expanding the structures and infrastructures with small expenditure and short a time in order to provide rising demands from their customers. To address these business challenges, cloud computing architecture was developed. In this technology, end users avail themselves of computing resources and services as a public utility, rather than a privately run small scale computing facility. In the same way that we use electricity as a public utility (rather than build our own generators), and that we use water as a public utility (rather than dig our own well), and that we use phone service as a public utility (rather than build and operate our own cell tower), we want to use computing services as a public utility. Such a service would be available to individuals and organizations, large and small, and would operate on the same pattern as other public utilities, namely: • Subscribers sign up for service from a service provider, on a contractual basis. • The service provider delivers services of data processing, data access and data storage to subscribers. • The service provider offers warranties on the quality of services delivered.
33 citations
•
TL;DR: This study reviews the literature on some challenges in cloud computing forensic investigation, and it is followed by evaluation and analysis of all types of information on cloud computing and its impacts on computer forensic investigations in publishing alliances with the survey was carried out in the field.
Abstract: Nowadays, digital storage of computer data is moving toward cloud computing which is a set of infrastructure provides data storage for organizations and individuals Due to this large scale, in case an attack occurs in the network of a cloud it would be a big challenge to investigate the cloud Therefore, digital forensics in cloud computing is a new discipline related to the increasing use of computers, networks and digital storage devices in numerous criminal activities in both traditional and Hi-Tech This study reviews the literature on some challenges in cloud computing forensic investigation, and it is followed by evaluation and analysis of all types of information on cloud computing and its impacts on computer forensic investigations in publishing alliances with the survey was carried out in the field
31 citations