scispace - formally typeset
Open AccessBook ChapterDOI

When is Digital Evidence Forensically Sound

Reads0
Chats0
TLDR
Examining the various definitions of forensic computing identifies the common role that admissibility and evidentiary weight play and explores how the term “forensically sound” has been used and examines the drivers for using such a term.
Abstract
“Forensically sound” is a term used extensively in the digital forensics community to qualify and, in some cases, to justify the use of a particular forensic technology or methodology. Indeed, many practitioners use the term when describing the capabilities of a particular piece of software or when describing a particular forensic analysis approach. Such a wide application of the term can only lead to confusion. This paper examines the various definitions of forensic computing (also called digital forensics) and identifies the common role that admissibility and evidentiary weight play. Using this common theme, the paper explores how the term “forensically sound” has been used and examines the drivers for using such a term. Finally, a definition of “forensically sound” is proposed and four criteria are provided for determining whether or not a digital forensic process may be considered to be “forensically sound.”

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues

TL;DR: The purpose of this paper is to identify and discuss the main issues involved in the complex process of IoT-based investigations, particularly all legal, privacy and cloud security challenges, as well as some promising cross-cutting data reduction and forensics intelligence techniques.
Journal ArticleDOI

Forensic-by-Design Framework for Cyber-Physical Cloud Systems

TL;DR: The authors discuss the challenges associated with a CPCS attack and highlight the need for forensic-by-design, prior to presenting their conceptual CPCS forensic- by-design model.
Journal ArticleDOI

A Forensically Sound Adversary Model for Mobile Devices.

TL;DR: The adversary model specifically considers and integrates the constraints of forensic soundness on the adversary, in this case, a forensic practitioner, and one construction of the adversary model is an evidence collection and analysis methodology for Android devices.
Proceedings ArticleDOI

The Forensics Edge Management System: A Concept and Design

TL;DR: The FEMS design aims to meet requirements for autonomy and independence, it is a system that can be integrated into a home-IoT network to conduct preliminary forensic investigations and to provide basic security services.
References
More filters
Book

Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet

Eoghan Casey
TL;DR: This completely updated edition provides the introductory materials that new students require, and also expands on the material presented in previous editions to help students develop these skills.
Journal Article

Defining Digital Forensic Examination and Analysis Tool Using Abstraction Layers.

TL;DR: The nature of tools in digital forensics is examined and a discussion of the definitions, properties, and error types of abstraction layers when used with digital forensic analysis tools is discussed.

What is forensic computing

TL;DR: An overview of the field of forensic computing is provided of the process of identifying, preserving, analysing and presenting digital evidence in a manner that is legally acceptable.