2016 Eleventh International Conference on Digital Information Management (ICDIM) 2016
DOI: 10.1109/icdim.2016.7829795
|View full text |Cite
|
Sign up to set email alerts
|

Information security and digital forensics in the world of cyber physical systems

Abstract: The security of Cyber Physical Systems and any digital forensic investigations into them will be highly dependent on data that is stored and processed in the Cloud. This paper looks at a number of the issues that will need to be addressed if this environment is to be trusted to securely hold both system critical and personal information and to enable investigations into incidents to be undertaken

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…CPS applications are being and will be implemented and deployed in many areas in our lives. Current CPS forensic techniques are mostly still in the research and evaluation stages (e.g., the overview in [96]), while most forensics work is being done using tools and techniques created for other types of distributed systems, such as cloud computing and enterprise systems. Furthermore, tools and techniques addressing both the cyber and physical parts of the CPS have not been introduced, although discussed on some occasions.…”
Section: Future Cps Forensics Directionsmentioning
confidence: 99%
“…CPS applications are being and will be implemented and deployed in many areas in our lives. Current CPS forensic techniques are mostly still in the research and evaluation stages (e.g., the overview in [96]), while most forensics work is being done using tools and techniques created for other types of distributed systems, such as cloud computing and enterprise systems. Furthermore, tools and techniques addressing both the cyber and physical parts of the CPS have not been introduced, although discussed on some occasions.…”
Section: Future Cps Forensics Directionsmentioning
confidence: 99%
“…This is where a final report (document) from previous stages is now taken to relevant officials to determine if it admissible to be used in court. It is actually a summary of all findings in each stages from different parties involved in an investigation [6][10] [11].…”
Section: Investigation Steps In Forensicsmentioning
confidence: 99%
“…Also to ensure the collected evidence information is made admissible to be used in court. The paper will generalize on the world of forensics and how it all works [4][5] [6].…”
Section: Introductionmentioning
confidence: 99%
“…Whether or not the collection of forensic data supports criminal investigation or enables protecting exposed vulnerabilities, many cyber incidents and crimes are not reported because, among other reasons beyond the difficulty, there is a belief that there is little chance of successful prosecution and even fear of negative publicity (Quick & Choo, 2016). Despite these factors, most consumer-level computing technology has increasingly asked its users to trust that technology will "function correctly and that information that [consumers] provide, or that is collected about them, will be adequately protected" (Centre & Jones, 2016) for a variety of daily uses (e.g., IoT devices, Google, Facebook, Instagram, Etc.). Unfortunately, this trust benefits the criminals given that a "majority of the people in modern societies are not particularly concerned about their data as long as they can happily and securely use technologies and commercial products to [enhance] their social lives" (Centre & Jones, 2016) and this mind-set shows no sign of changing any time soon.…”
Section: Introductionmentioning
confidence: 99%
“…Despite these factors, most consumer-level computing technology has increasingly asked its users to trust that technology will "function correctly and that information that [consumers] provide, or that is collected about them, will be adequately protected" (Centre & Jones, 2016) for a variety of daily uses (e.g., IoT devices, Google, Facebook, Instagram, Etc.). Unfortunately, this trust benefits the criminals given that a "majority of the people in modern societies are not particularly concerned about their data as long as they can happily and securely use technologies and commercial products to [enhance] their social lives" (Centre & Jones, 2016) and this mind-set shows no sign of changing any time soon.…”
Section: Introductionmentioning
confidence: 99%