Forensic Computing: Research and Analysis Report - University Name

Verified

Added on  2022/08/22

|6
|1072
|18
Report
AI Summary
This report provides an analysis of several research papers related to forensic computing. The first paper introduces the Digital Evidence Reporting and Decision Support (DERDS) framework, designed to aid practitioners in evaluating the reliability of inferences in digital investigations. The second paper focuses on SCADA (Supervisory Control and Data Acquisition) systems, assessing vulnerabilities and recommending security measures. The third paper explores a formal knowledge model for online social network forensics, aiming to improve the analysis of large datasets. The fourth paper discusses a multi-layered semantic framework for integrated forensic acquisition on social media. The final paper surveys tools, techniques, and methodologies in digital forensics for SCADA systems, highlighting the need for robust security measures. Each paper addresses specific challenges and proposes solutions within the field of digital forensics, providing insights into various aspects of the discipline, from framework development to system security.
Document Page
Running head: FORENSIC COMPUTING
FORENSIC COMPUTING
Name of student
Name of university
Author’s note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
FORENSIC COMPUTING
Reference Title Proposed
Method
Problem
Stateme
nts
Research
Method
(Ex.
Literature
Review)
Research
Questions
The
research
Gap
Proposed work
& Future Scope
Horsman,
Graeme.
"Formalisi
ng
investigati
ve
decision
making in
digital
forensics:
proposing
the Digital
Evidence
Reporting
and
Decision
Support
(DERDS)
framework
." Digital
Investigati
on 28
(2019):
146-151.
Formalis
ing
investiga
tive
decision
making
in digital
forensics
:
Proposin
g the
Digital
Evidence
Reportin
g and
Decision
Support
(DERDS
)
framewo
rk
The
DERDS
framework
has been
proposed
in this
research
paper. The
DERDS
framework
helps the
practitione
rs for
assessing
the
significant
ly
reliability
of the
inference,
the
assumptio
ns of the
conclusion
s in
associatio
n to any
potential
The lack
of
extensive
ly
dedicate
d
research
as well
as the
formalisa
tion of
the the
investiga
tive
models
for
decision
making
for
supportin
g the
practitio
ner’s
digital
forensics
in the
provided
issues in
Similar to
other
disciplines, the
practitioners of
the digital
forensics
remains
significantly
vulnerable to
the human
errors, the
restrictions of
extensive
knowledge as
well as any
common
mistake. In the
DF, it is
required to be
acknowledged
that the errors
might not be
always
procedural or
even technical
in the origin,
where the non-
technical
How
effective is
the DERDS
framework?
Is the result
gained from
the use of
the DERDS
framework
accurate?
Where none
of the
existing
case work
precedent
exists, the
practitioners
are now
faced with
the dilemma
of following
the two
possible
routes using
the DERDS
framework,
for
identifying
as well as
following
interpretatio
ns of
evidence
offered in
the existing
published
works or
even test
DERDS
framework could
be used for
establishing as
well as testing the
reliability of the
inferences,
conclusions or the
assumptions.
Document Page
2
FORENSIC COMPUTING
evidential
findings.
relation
to the
complexi
ty of the
various
digital
investiga
tions.
sources of any
kind of error,
for including
the things such
as the
misinterpretati
ons of the
value, meaning
or the
reliability of
the piece of
efficient
evidence.
and then
validate
their
personal
findings.
Upadhyay,
Darshana,
and
Srinivas
Sampalli.
"SCADA
(Superviso
ry Control
and Data
Acquisitio
n)
systems:
Vulnerabil
ity
assessmen
t and
security
recommen
dations."
Computer
SCADA
(Supervi
sory
Control
and Data
Acquisiti
on)
systems:
Vulnerab
ility
assessme
nt and
security
recomme
ndations
Analysis
of the
SCADA
vulnerabili
ties and
the
various
threats for
identifying
the
potential
breaches
or the
aspects
within the
system
where the
breach
might
Without
the
proper
analysis
of the
vulnerabi
lities, the
proper
security
mechanis
m could
not be
impleme
nted in
the
system
for
ensuring
the
eliminati
The SCADA
network
mainly
involves the
control server
placed at
control centre,
the
communicatio
n links as well
as one or even
more
topographicall
y dispersed
sites of field
comprising the
field devices.
What is the
impact of
the
vulnerabiliti
es in the
SCADA
network on
the
organization
?
The
vulnerabiliti
es of the
SCADA
network has
been
discovered
and the
threats have
been
analysed
but the
proper
mitigation
strategies
are not
discovered.
Upcoming
standards would
need advanced
recommendations,
and the
administrative
policies for the
proper security
mechanisms.
Document Page
3
FORENSIC COMPUTING
s &
Security 8
9 (2020):
101666.
occur. on of
threats.
Arshad,
Humaira,
Aman
Jantan,
Gan Keng
Hoon, and
Isaac
Oludare
Abiodun.
"Formal
knowledge
model for
online
social
network
forensics."
Computer
s &
Security 8
9 (2020):
101675.
Formal
knowled
ge model
for
online
social
network
forensics
Use of
theoritical
and the
formal
knowledge
model for
the
forensic
automatio
n on the
online
social
networks.
The
analysis
of huge
amount
of data
for
determin
ing the
most
appropri
ate
results is
the main
issue that
is
causing
significa
nt
problems
in the
present
times.
Event based
knowledge
model in the
digital
forensics has
been
established.
What are
the results
gained from
the analysis
of the social
networks?
Previous
models
provided
the method
of analyzing
the social
media
network but
were not
effective in
analyzing
the proper
data so
there is a
need of
effective
model and
the formal
knowledge
model could
be used.
Platform specific
ontology could be
developed in the
future and the
correlations could
be further used
for formulating
the analysis
operators.
Arshad,
Humaira,
Aman
Jantan,
Gan Keng
Hoon, and
Anila
A
multilaye
red
semantic
framewo
rk for
integrate
Multi-
layered
framework
is used
from the
collection
to the
Forensic
process
is
technical
ly
intricate
because
The forensic
artifacts are
considered as
the critical
source of the
evidence on
the social
Does the
tools of
social
media
analysis
generate
efficient
Various
approaches
have been
determined
in the past
but none of
the
Provenance
model would be
produced by sing
the generic and
standard
provenance
management
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
FORENSIC COMPUTING
Sahar
Butt. "A
multilayer
ed
semantic
framework
for
integrated
forensic
acquisition
on social
media." D
igital
Investigati
on 29
(2019):
147-158.
d
forensic
acquisiti
on
on social
media
evidence
analysis.
of the
heteroge
neous
and the
unstructu
red
online
social
networks
.
media. data? approaches
have been
effective for
generating
the accurate
results.
Multi-
layered
framework
could
generate
accurate
data after
analysis.
approaches.
Awad,
Rima
Asmar,
Saeed
Beztchi,
Jared M.
Smith,
Bryan
Lyles, and
Stacy
Prowell.
"Tools,
techniques
, and
methodolo
gies: A
Tools,
Techniqu
es, and
Methodo
logies: A
Survey
of
Digital
Forensic
s for
SCADA
Systems
Security
suite has
been
proposed
that helps
in
protecting
the
multiple
levels of
network
and
provide
compatibil
ity with
the legacy
SCADA
systems
have not
been
designed
with the
primary
goal of
interactin
g with
digital
world.
Develop broad
applicable
frameworks,
develop the
device specific
forensic tools
and follow the
principle of the
generality
during
designing and
implementing
the new
systems.
Can the
security
practitioners
leverage the
digital
forensics
for
preventing
the attacks
against the
critical
infrastructur
e?
Various
tools have
been
discovered
but none
effective
tools and
methodolog
y has not
been
determined.
In future, more
effective tools
would be
discovered that
would help in
preventing
various kinds of
attacks.
Document Page
5
FORENSIC COMPUTING
survey of
digital
forensics
for scada
systems."
In Procee
dings of
the 4th
Annual
Industrial
Control
System
Security
Workshop,
pp. 1-8.
2018.
systems.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]