STEPS TOWARD DEVELOPING CYBER FORENSIC MODEL PART I

Download
File
2.2013eBook.pdf

Dear Readers,

We would like to present you our new issue of eForensics eBook, covering the subject of Developing a Computer Forensic Model to Investigate Cyber Crimes written by our contributor and friend Bryan Soliman

The soaring trends of cyber crimes on businesses, organizations, and individuals have raised the awareness among these entities to implement a cyber forensic model that can assist investigating cyber incidents, and obtain the evidence of the cyber attacks to impalement prevention or preceding prosecution.

Increasing the needs for the cyber forensic model that can stand against the cyber attacks promoted various cyber  forensic models that inhibited variety of procedures and forensic tools, where they can serve investigating the cyber incidents. Although most of these models encompass the right approaches that can serve the purpose, these models lack the availability of options that can extend the choices for organizations to implement whatever fit better with their infrastructures, and budget.

In addition to the above problem, the available cyber forensic models do not promote the implementation of the Selection Criteria that can be utilized to build other forensic models. The lack of having the Selection Criteria that can be employed by organizations to build their own cyber forensic model creates various problems when there is a need for changing technologies, and implementing new cyber forensic model that can emerge with new infrastructure.

Lacking the existence of the cyber forensic model that can offer various options of implementation of its procedures and forensic tools for any organization to choose from represents a problematic issue for many organizations. Also, lacking the existence of a Selection Criteria that is based on standards, and recommendations where it can serve to implement various cyber forensic models represents another hurdle for any organization to address.

This article offers the solution to the above problems through the study to implement a Selection Criteria that can be employed to build a cyber forensic model for Windows environment. The developed Selection Criteria will also serve in creating a Cyber Forensic Model that entails various options of procedures, and forensic tools that can be utilized by many organizations to build their own cyber forensic model. The Cyber Forensic Model will be dedicated to the Windows environment, and cyber investigation.


Download
File
2.2013eBook.pdf

July 30, 2021
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023