2007
DOI: 10.1016/j.diin.2007.06.006
|View full text |Cite
|
Sign up to set email alerts
|

Specifying digital forensics: A forensics policy approach

Abstract: PolicyComputer security System specification Forensic properties a b s t r a c t In this paper we present an approach to digital forensics specification based on forensic policy definition. Our methodology borrows from computer security policy specification, which has accumulated a significant body of research over the past 30 years. We first define the process of specifying forensics properties through a forensics policy and then present an example application of the process. This approach lends itself to for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(31 citation statements)
references
References 3 publications
0
31
0
Order By: Relevance
“…Meanwhile, [47] define a forensics policy as closely related to forensics readiness. Forensics policy and forensics readiness are policies that will encourage an institution to undertake activities which will ensure a minimum cost and maximum environment ability to get digital evidence.…”
Section: Security Standard and Forensics Policymentioning
confidence: 99%
“…Meanwhile, [47] define a forensics policy as closely related to forensics readiness. Forensics policy and forensics readiness are policies that will encourage an institution to undertake activities which will ensure a minimum cost and maximum environment ability to get digital evidence.…”
Section: Security Standard and Forensics Policymentioning
confidence: 99%
“…Several researchers have focused on the organizational aspects of forensic readiness. Yasinsac and Manzano [23] have defined policies for computer and network forensics; Wolfe [23] has discussed forensic policies in organizations; Rowlingson [19] has specified a ten step process for implementing forensic readiness; Luoma [13] has proposed the establishment of a multi-disciplinary management team to ensure legal compliance with discovery requests; and Taylor, et al [21] have studied forensic policy specification and its use in forensic readiness.…”
Section: Related Workmentioning
confidence: 99%
“…Businesses processes do not specify the boundaries for acceptable use. Ideally, acceptable use is specified via policies [21] derived from authoritative sources such as information privacy laws and ethical guidelines. In some instances, eth-ical guidelines (such as the Fair Information Principles) may require the creation of "privacy-specific business processes" that deal with private information.…”
Section: Rationalementioning
confidence: 99%
See 1 more Smart Citation
“…Organisational policy, such as an overall forensics policy, should form the basis for DFR (Yasinsac & Manzano 2001) (Rowlingson 2005) (Taylor et al 2007). Thus, the staff involved with DFR should have access to the necessary policies to inform their decision making.…”
Section: Dfr Informationmentioning
confidence: 99%