Montasari, R., & Hill, R. (2019). Next-Generation Digital Forensics: Challenges and Future Paradigms.
2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), Global Security, Safety and Sustainability (ICGS3)
Sahinoglu, M., Stockton, S., Barclay, R. M., & Morton, S. (2016). Metrics Based Risk Assessment and Management of Digital Forensics.
Defense Acquisition Research Journal: A Publication of the Defense Acquisition University, 23
Nnoli, H. Lindskog, D, Zavarsky, P., Aghili, S., & Ruhl, R. (2012). The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches,
2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, Amsterdam
The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.
MAKE SURE TO REPLY TO MY PEER POSTS AFTER YOU SUBMIT THE ANSWER PLEASE
Plz reply to these 2 peer posts
Digital Forensics and Risk Management
Digital forensics is a branch of investigative science that deals with the extraction and recovery of evidence from a digital and electronic device (Casey & Souvignet, 2020). This technique has increasingly become popular, especially in the current era where cybercrimes have skyrocketed. Digital forensics can be applied in risk management, especially in the context that other risk management strategies have failed, allowing a successful breach of data. One of the major cases of application of digital forensics for risk management is to produce evidence to support an organization facing disciplinary issues. It helps an organization in determining the actual culprits who are set to face disciplinary action.
Digital forensics is also important in reducing cases of cybercrimes. Applying techniques such as threat modeling allows an organization to come up with a structured representation of various threat actors that face an enterprise. The outcome of such exercise can be applied practically by implementing some countermeasures on potential digital evidence (Casey & Souvignet, 2020). Additionally, digital forensics is important in quantifying the impact of cybercrime. This technique is applied to obtain accurate information about the incident that acted in contributing to the attack.
Digital forensics is also important in helping an enterprise demonstrate some compliance with legal requirements. Evidence can be gathered through digital forensics to justify that an enterprise met all the legal requirements both in jurisdiction and regulation (Casey & Souvignet, 2020). In some cases, the digital evidence obtained through this process may be used to justify or settle disagreements that involve employees and the organization. This information would include information such as terms and conditions that were signed before. The contract management systems are mostly to standardize metadata that are needed to provide a supportive ground for solving a dispute.
Casey, E., & Souvignet, T. R. (2020). Digital transformation risk management in forensic science laboratories. Forensic Science International, 316,
Digital Forensics as a Risk Management Program
Digital forensic is a field of forensic science that focuses on the recovery and investigation of
found in digital devices related to cybercrime. Also, it can be described as the process of identifying, preserving, analyzing, and documenting digital evidence. This is done so that evidence can be presented in a court of law if necessary. As society’s reliance on computer systems and cloud computing grows, digital forensics becomes an increasingly important aspect of law enforcement and business. The identification, preservation, examination, and analysis of digital evidence using scientifically accepted and validated processes is the focus of digital forensics (Sule, 2016).
Digital forensics is concerned with the detection, preservation, review, and analysis of digital proof, both within and outside of a court of law, using scientifically agreed and validated methods (Corsa, 2020). One can confidently conduct business in a state of perpetual incident readiness by taking a multifaceted approach to digital forensic preparedness. The importance of continuous collection and documentation cannot be overstated to prepare for the potential need for digital evidence, blended in physical, technical, and administrative operations. Cybercriminals, both internal and external, pose a significant risk to any organization, regardless of industry or size. While a company may have processes and procedures in place to prevent unauthorized users from accessing electronic data, there are clear ways to proactively gather evidence to help limit the scope of an inevitable forensic investigation.
Unless one has an unlimited amount of time and money, considering everything in scope is not a feasible or efficient use of a computer forensic investigator. Being prepared ahead of time will significantly reduce the cost of a potential investigation and assist the investigator in directing the investigation in the right direction (Sule, 2016). New advanced analytical tools and monitoring are being developed today to assist businesses in managing current and emerging fraud risks. Despite their eagerness to use them, few respondents said they fully understand the value that forensic data analytics can provide.
Corsa, D. (2020). Reduce Business Risk with Digital Forensic Preparedness. Compass IT Compliance.
Sule, D. (2016). Digital evidence and forensic readiness. Using Forensic Readiness and E-Discovery in Quality Information Risk Management Planning, 187-692.