Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment
Abstract
:1. Introduction
2. Theoretical Background
2.1. Smart Work Environment Characteristics Based on Cloud Computing
- Private cloud—Environment technology materialized internally from a single organization;
- Community cloud—Dispersal environment technology composed of a group or business partner to share business resources;
- Public cloud—Shared environment technology that can be utilized by proving access to the public;
- Hybrid cloud—Technology utilizing more than two clouds.
2.2. Digital Forensics Readiness
3. Designing a Digital Forensic Readiness Model in a Cloud Computing Environment
3.1. Research Methodology Design
3.2. Designing a Readiness Model for Digital Forensic Readiness Measurement in the Cloud Computing-Based Smart Work Environment
3.3. Verification of Digital Forensic Readiness Model in Cloud Computing-Based Smart Work Environment
4. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
References
- Baek, S.; Lim, J. A Study on the Forensic Readiness as an Effective Measure for Personal Information Protection. Internet Inf. Secur. 2012, 3, 34–64. [Google Scholar]
- Elyas, M.; Maynard, S.B.; Ahmad, A.; Lonie, A. Towards a systemic framework for digital forensic readiness. J. Comput. Inf. Syst. 2014, 54, 97–105. [Google Scholar] [CrossRef]
- Mell, P.; Grance, T. The NIST Definition of Cloud Computing; Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, United States Department of Commerce: Gaithersburg, MD, USA, 2011.
- Boorsma, B.; Shane, M. Work-Life Innovation: Smart Work—A Paradigm Shift Transforming How, Where, and When Work Gets Done; Cisco Internet Business Solutions Group: San Jose, CA, USA, 2011. [Google Scholar]
- Ministry of the Interior, Republic of Korea. Cloud Work Environment Introduction Guide in Administrative Agency; Ministry of the Interior: Seoul, Korea, 2016.
- Software Policy & Research Institute. Key Issue and Countermeasures in Cloud Security; Software Policy & Research Institute: Gyeonggi, Korea, 2017. [Google Scholar]
- Liao, Y.C.; Langweg, H. Evidential Reasoning for Forensic Readiness. J. Digit. Forensics Secur. Law 2016, 11, 37–52. [Google Scholar] [CrossRef]
- Raghavan, S. Digital forensic research: Current state of the art. CSI Trans. ICT 2013, 1, 91–114. [Google Scholar] [CrossRef]
- Elyas, M.; Ahmad, A.; Maynard, S.B.; Lonie, A. Digital forensic readiness: Expert perspectives on a theoretical framework. Comput. Secur. 2015, 52, 70–89. [Google Scholar] [CrossRef]
- Dezfoli, F.N.; Dehghantanha, A.; Mahmoud, R. Digital Forensic Trends and Future. Int. J. Cyber-Secur. Digit. Forensics 2013, 2, 48–76. [Google Scholar]
- Lee, C.H. Digital Forensics Framework for Cloud Computing. J. Adv. Navig. Technol. 2013, 17, 63–68. [Google Scholar] [CrossRef]
- Sachowski, J. Implementing Digital Forensic Readiness: From Reactive to Proactive Process; Syngress: Cambridge, MA, USA, 2016; pp. 45–153. ISBN 9780128044544. [Google Scholar]
- Endicott, B.; Popovsky, N.K.; Rudolph, C. Forensic Readiness: Emerging Discipline for Creating Reliable and Secure Digital Evidence. J. Harbin Inst. Technol. 2015, 22, 1–8. [Google Scholar]
- Rafique, M.; Khan, M.N.A. Exploring static and live digital forensics: Methods, practices and tools. Int. J. Sci. Eng. Res. 2013, 4, 1048–1056. [Google Scholar]
- Kim, J.; Son, Y.; Chung, M. A Design of Evaluation Framework for the Assets and Insolvency Prediction Depending on the Industry Type Using Data Standardization based on the Forensic Readiness. Int. J. Multimedia Ubiquitous Eng. 2015, 10, 345–354. [Google Scholar] [CrossRef]
- Hale, J.S. Amazon cloud drive forensic analysis. Digit. Investig. 2013, 10, 259–265. [Google Scholar] [CrossRef]
- Al-Mahrouqi, A.; Abdalla, S.; Kechadi, T. Cyberspace Forensics Readiness and Security Awareness Model. Int. J. Adv. Comput. Sci. Appl. 2015, 6, 123–127. [Google Scholar] [CrossRef]
- Kebande, V.R.; Venter, H.S. Novel digital forensic readiness technique in the cloud environment. Aust. J. Forensic Sci. 2017, 1–40. [Google Scholar] [CrossRef]
- Reddy, K.; Venter, H.S. The architecture of a digital forensic readiness management system. Comput. Secur. 2013, 32, 73–89. [Google Scholar] [CrossRef]
- Kohn, M.D.; Eloff, M.M.; Eloff, J.H. Integrated digital forensic process model. Comput. Secur. 2013, 38, 103–115. [Google Scholar] [CrossRef]
- Tot, L.; Grubor, G.; Marta, T. Introducing the Information Security Management System in Cloud Computing Environment. Acta Polytech. Hung. 2015, 12, 147–166. [Google Scholar]
- Daryabar, F.; Dehghantanha, A.; Udzir, N.I.; Mohd Sani, N.F.; Shamsuddin, S.; Norouzizadeh, F. A Review on Impacts of Cloud Computing on Digital Forensics. Int. J. Cyber-Secur. Digit. Forensics 2013, 2, 77–94. [Google Scholar]
- Almulla, S.A.; Iraqi, Y.; Jones, A. A state-of-the-art review of cloud forensics. J. Digit. Forensics Secur. Law 2014, 9, 7–28. [Google Scholar] [CrossRef]
- Valjarevic, A.; Venter, H.S. A comprehensive and harmonized digital forensic investigation process model. J. Forensic Sci. 2015, 60, 1467–1483. [Google Scholar] [CrossRef] [PubMed]
- Van Beek, H.M.A.; van Eijk, E.J.; van Baar, R.B.; Ugen, M.; Bodde, J.N.C.; Siemelink, A.J. Digital forensics as a service: Game on. Digit. Investig. 2015, 15, 20–38. [Google Scholar] [CrossRef]
- Ruan, K.; Carthy, J.; Kechadi, T.; Baggili, I. Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results. Digit. Investig. 2013, 10, 34–43. [Google Scholar] [CrossRef]
- Bashir, M.S.; Khan, M.N.A. Triage in live digital forensic analysis. Int. J. Forensic Comput. Sci. 2013, 1, 35–44. [Google Scholar] [CrossRef]
- Martini, B.; Choo, K.K.R. Cloud storage forensics: Own Cloud as a case study. Digit. Investig. 2013, 10, 287–299. [Google Scholar] [CrossRef]
- Pichan, A.; Lazarescu, M.; Soh, S.T. Cloud forensics: Technical challenges, solutions and comparative analysis. Digit. Investig. 2015, 13, 38–57. [Google Scholar] [CrossRef]
- Quick, D.; Choo, K.K.R. Google drive: Forensic analysis of data remnants. J. Netw. Comput. Appl. 2014, 40, 179–193. [Google Scholar] [CrossRef]
- Quick, D.; Choo, K.K.R. Impacts of increasing volume of digital forensic data: A survey and future research challenges. Digit. Investig. 2014, 11, 273–294. [Google Scholar] [CrossRef]
- Dlamini, M.; Venter, H.; Eloff, J.; Eloff, M. Requirements for Preparing the Cloud to Become Ready for Digital Forensic Investigation. In Proceedings of the European Conference on Cyber Warfare and Security, Piraeus, Greece, 3–4 July 2014; pp. 242–250. [Google Scholar]
- Shah, J.; Malik, L.G. Cloud forensic issues and challenges. In Proceedings of the International Conference on Emerging Trends in Engineering and Technology, Bucharest, Romania, 19–21 September 2013; pp. 138–139. [Google Scholar]
- Damshenas, M.; Dehghantanha, A.; Mahmoud, R.; Shamuddin, S.B. Cloud computing and conflicts with digital forensic investigation. Int. J. Digit. Content Technol. Appl. 2013, 7, 543–553. [Google Scholar]
- Lee, G.M.; Lee, Y.S. Digital Forensic Model Suitable for Cloud Environment. J. Inf. Secur. 2017, 17, 15–20. [Google Scholar]
- Tavakol, M.; Dennick, R. Making sense of Cronbach’s alpha. Int. J. Med. Educ. 2011, 2, 53–55. [Google Scholar] [CrossRef] [PubMed]
- Lee, J.H.; Cho, S.H. An Analysis on the Problems of Design Competition Process of Landscape Architecture by the Delphi Analysis Method. J. Korean Inst. Landsc. Arch. 2013, 41, 83–93. [Google Scholar] [CrossRef]
- Nam, S.T.; Jin, C.Y.; Kim, D.G. Preference Analysis for Location Based Services on Smartphone Environment Using Analytic Hierarchy Process. J. Korea Inst. Inf. Commun. Eng. 2014, 18, 1337–1342. [Google Scholar] [CrossRef]
Existing Work Environment | Smart Work Environment (Cloud) | |
---|---|---|
User | Internal access based on PC or access through the internet | Combined wire-wireless access through multi-channel |
Construct (Realization) | Individual construction by organization division (Realization) | Mutual utilization by organization division (Realization) |
System | Wide variety of independent systems | Unity, standard, open-based system |
Assets | Tangible asset (System) | Intangible asset (Service) |
Ownership | Asset Ownership (Purchase) | Return/rent after usage (Mutual utilization) |
Existing Work Environment | Smart Work Environment (Cloud) | |
---|---|---|
Terminal Administration | Relatively low rate of terminal loss due to high usage rate of fixed terminal | Information leakage followed by diversity and loss of user terminals such as mobile terminal |
Security Issue | Less danger of hacking in network section compared to smart work environment owing to high frequency of cable network usage utilizing a fixed terminal | Increase in hacking risk in wireless network section (Wi-Fi, Bluetooth, etc.) owing to high frequency of practical use in mobile environment using mobile terminals |
Information Asset Ownership and Administration | Relatively low rate of information leakage danger by storing information assets internally, such as on servers within the organization | Occurrence of information leakage danger due to entrusting information asset storage to cloud service firms |
Legislation and Regulations | Relatively easy to determine where the responsibility lies or conduct an audit when information leakage occurs | In the case of information leakage, matter of responsibility is ambiguous, and it is difficult to audit according to resource sharing |
Component | [2] | [9] | [13] | [15] | [19] | [20] | [23] | [24] | [25] | [26] |
---|---|---|---|---|---|---|---|---|---|---|
(1) Adhering to legal requirements | ● | ● | ||||||||
(2) Legal requirements | ● | ● | ||||||||
(3) Interacting with law enforcement organizations | ● | ● | ● | |||||||
(4) Case report guide for investigation institutions | ● | |||||||||
(5) Information sharing and cooperation with external organizations | ● | |||||||||
(6) Establish single contact point with law enforcement organizations | ● | |||||||||
(7) Education and training targeting employees, and regular reminder activities | ● | ● | ● | |||||||
(8) Digital forensic education and training, and awareness improvement activities | ● | ● | ● | |||||||
(9) Internal/External training | ● | ● | ● | |||||||
(10) Internal digital forensic ability maintenance or external professional identification and usage policy | ● | |||||||||
(11) Policy content education and training targeting employees | ● | ● | ● | |||||||
(12) Create an exclusive forensics department | ● | |||||||||
(13) Incident response personnel establishment | ● | |||||||||
(14) Forensic policy | ● | ● | ● | |||||||
(15) Monitoring policy | ● | ● | ● | ● | ● | |||||
(16) Comprehensive digital forensic management framework | ● | ● | ||||||||
(17) Forensic readiness policy | ● | ● | ||||||||
(18) Forensic incident response roles and responsibilities policy | ● | ● | ||||||||
(19) Establish evidence preservation policy | ● | |||||||||
(20) Forensic readiness procedure | ● | ● | ● | |||||||
(21) Forensic investigation procedure | ● | ● | ● | |||||||
(22) Check lists | ● | |||||||||
(23) Organizational culture | ● | ● | ||||||||
(24) Governance structure | ● | ● | ||||||||
(25) Prepare forensics solutions | ● |
Component | [8] | [14] | [15] | [16] | [17] | [18] | [19] | [22] | [23] | [24] | [27] | [28] | [29] | [30] | [31] |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
(26) Forensic evidence processing | ● | ● | ● | ● | ● | ||||||||||
(27) Forensic equipment and tools | ● | ● | |||||||||||||
(28) Composer metadata | ● | ||||||||||||||
(29) Usage time record | ● | ● | ● | ||||||||||||
(30) Search support technologies | ● | ||||||||||||||
(31) Log management technologies | ● | ● | ● | ● | ● | ● | |||||||||
(32) Kernel/file system access tracking | ● | ● | ● | ● | |||||||||||
(33) Hashing technologies | ● | ||||||||||||||
(34) Data collection and normalization | ● | ||||||||||||||
(35) Integrity-securing algorism application | ● | ● | |||||||||||||
(36) Infrastructure preparation | ● | ||||||||||||||
(37) Encryption of files and communication channels | ● | ||||||||||||||
(38) Safe storage technologies | ● | ● | ● | ● | |||||||||||
(39) Model intrusion test | ● | ||||||||||||||
(40) Attacker estimation graph | ● | ||||||||||||||
(41) Profiling technologies | ● | ||||||||||||||
(42) Network design | ● | ||||||||||||||
(43) Computer and Server technologies | ● | ||||||||||||||
(44) Intrusion detection system | ● | ||||||||||||||
(45) Integrity verification technologies | ● | ||||||||||||||
(46) Distribution monitoring data sharing and link technologies | ● | ● |
Area (Reference Mapping) | Component and Description | |
---|---|---|
Policy readiness | Outside the organization environment (1), (2), (3), (4), (6) | -Adhere to digital forensics related standards/guidelines: Secure integrity/reliability of digital evidence by adhering to digital forensics related standards/guidelines -Adhere to legal requirements: Adhere to legal procedure (secure suitability/objectivity) -Establish single contact point with law enforcement organizations: Establish single contact point with law enforcement organizations for continuous interactions regarding court cases -Produce incident report guideline for investigative agency: Guide production to organize processes and methods in order to report to the investigative agency when incidents occur |
Within the organization guideline (7), (8), (9), (11), (12), (13), (14), (15), (16), (17), (18), (19), (20), (21), (25) | -Prepare forensics solutions (proactive/detailed analysis tools): Secure a proactive evidence collection system through preparation of forensics solution -Prepare forensics equipment (writing prevention devices, copiers, etc.): Secure proactive evidence collection system through preparation of forensics equipment -Identify and categorize information assets: Identify and categorize information assets for effective administration thereof -Assign responsibility of information assets: Assign responsibility of information assets to reinforce responsibility traceability when information assets infringement incidents occur -Secure confidentiality agreements, etc.: Secure confidentiality agreements, etc. to reinforce organization members’ security consciousness and responsibility -Establish an evidence preservation system (server): Maintain safe preservation and integrity of original evidence through the construction of an evidence preservation system (server) -Use proven forensics tools: Secure the reliability/objectivity of forensic tools -Create an exclusive forensics department (personnel): Create an exclusive department (personnel) to conduct an effective digital forensic -Educate and train employees considering environmental changes: Educate and train employees periodically to cope with the rapidly changing environment -Establish evidence preservation policy: Maintain safe preservation and integrity of original evidence through the development of an evidence preservation policy -Establish personnel audit policy: Ensure legitimacy of internal audit | |
Technical readiness | System information (31), (32), (34), (42) | -Analyze the basic system information: Analyze the system environment by analyzing basic system information -Analyze system on/off time: Analyze the system environment by analyzing the system on/off time -Examine the system access authority: Analyze the system environment by examining the system access authority -Analyze the installed program breakdown: Analyze the system environment by analyzing the installed program breakdown -Analyze the auto-execution program breakdown: Analyze the system environment by analyzing the auto-execution program list -Analyze the network information: Analyze the network environment such as IP/MAC Address and bandwidth -Analyze the shared folder breakdown: Analyze the network environment such as shared folder breakdown -Analyze the external storage memory connection breakdown: Analyze the user’s act of usage to confirm if external storage memory should be used -Analyze the anti-forensic trace: Analyze the user’s act of usage to confirm if anti-forensic analysis should be conducted -Analyze the virtualization environment construction trace: Analyze the user’s act of usage to confirm if the virtualization environment should be constructed -Analyze the cloud service synchronization breakdown: Analyze the user’s act of usage to confirm if the cloud service should be utilized |
Terminal information (38) | -Secure volatility memory within the terminal: Secure volatility data that can easily disappear in the terminal -Collect/gain flash memory: Flash memory data gain for terminal analysis -Collect/gain microSD cards: Gain microSD cards data for terminal analysis -Collect/gain USIM cards: Gain USIM cards for terminal analysis -Collect/gain virtual machine image: Collect/gain virtual machine image for virtualization environment analysis in the case of virtualization environment-built terminals | |
User Information (41) | -Analyze user account information: Analyze basic information on user account -Analyze user registry: Analyze basic information on user account -Analyze visited website information: Analyze the user’s website usage pattern -Analyze portal search words: Analyze the user’s website usage pattern -Analyze recently opened documents: Analyze the user’s document data (local system) act of use -Analyze recently executed programs: Analyze the user’s application program act of use -Analyze executed commands: Analyze the user’s command act of usage -Analyze the user’s used services: Analyze the user’s service act of use | |
Usage Information (29), (40) | -Analyze window artifact timeline analysis: Analyze mainly used OS artifact timeline in fixed terminal -Analyze Mobile OS (Android/iOS, etc.) artifact timeline: Analyze OS artifact timeline of primary mobile terminal -Analyze MAC file timeline: Analyze the user’s file usage pattern according to flow of time -Analyze action through timeline: Analyze the user’s action according to flow of time -Apply credible time stamp: Apply credible time stamp to clearly confirm flow of time | |
Additional Function (30), (33) | -Provide prompt file searches: Provide file searches for prompt digital forensic performance -Search and analyze large files: Provide large file searches to analyze cloud computing servers retaining large files -Analyze the existence of unauthorized files: Provide searches to confirm if files are authorized -Search encrypted files and decrypt: Provide searches for encrypted file analysis -Analyze of hidden files by changing the extension: Provide searches for hidden files analysis -Derive hash values for searched files: Derive hash values to enhance search reliability -Search files including personal information: Provide file searches containing sensitive personal information |
Area (Reference Mapping) | Component | Validity | Acceptance | |
---|---|---|---|---|
Policy readiness | Outside the organization environment (1), (2), (3), (4), (6) | Adhere to digital forensics related standards/guidelines | 4.37 | O |
Adhere to legal requirements | 4.27 | O | ||
Establish single contact point with law enforcement organizations | 4.33 | O | ||
Production of incident report guideline for investigative agency | 3.20 | X | ||
Average Validity Outside the Organization Environment | 4.04 | |||
Within the organization guideline (7), (8), (9), (11), (12), (13), (14), (15), (16), (17), (18), (19), (20), (21), (25) | Prepare forensics solutions (proactive/detailed analysis tools) | 3.97 | O | |
Prepare forensics equipment (writing prevention devices, copiers, etc.) | 3.97 | O | ||
Identify and categorize information assets | 4.00 | O | ||
Assigning responsibility by information assets | 2.87 | X | ||
Secure confidentiality agreements, etc. | 4.10 | O | ||
Establish evidence preservation system (server) | 4.03 | O | ||
Use proven forensics tools | 4.17 | O | ||
Create an exclusive forensics department (personnel) | 4.13 | O | ||
Employee education and training considering environmental changes | 4.03 | O | ||
Establish evidence preservation policy | 4.20 | O | ||
Establish personnel audit policy | 4.00 | O | ||
Average Validity within the Organization Guideline | 3.95 | |||
Technical readiness | System information (31), (32), (34), (42) | Analyze basic system information | 3.80 | O |
Analyze system on/off time | 4.13 | O | ||
System access authority examination | 2.73 | X | ||
Analyze installed program breakdown | 3.80 | O | ||
Analyze auto-execution program breakdown | 3.60 | O | ||
Analyze network information | 3.47 | O | ||
Analyze shared folder breakdown | 3.67 | O | ||
Analyze external storage memory connection breakdown | 3.63 | O | ||
Analyze anti-forensic trace | 3.97 | O | ||
Analyze virtualization environment construction trace | 3.93 | O | ||
Analyze cloud service synchronization breakdown | 3.73 | O | ||
Average Validity of System Information | 3.68 | |||
Terminal information (38) | Secure volatility memory within the terminal | 3.07 | X | |
Collect/gain flash memory | 4.17 | O | ||
Collect/gain microSD cards | 4.03 | O | ||
Collect/gain USIM cards | 3.90 | O | ||
Collect/gain virtual machine image | 3.97 | O | ||
Average Validity of Terminal Information | 3.83 | |||
User Information (41) | Analyze user account information | 4.07 | O | |
User registry analysis | 3.27 | X | ||
Analyze visited website information | 4.03 | O | ||
Analyze portal search word | 3.90 | O | ||
Analyze recently opened documents | 3.93 | O | ||
Analyze recently executed programs | 3.97 | O | ||
Analyze executed commands | 3.90 | O | ||
Analyze user’s used services | 3.90 | O | ||
Average Validity of User Information | 3.87 | |||
Usage Information (29), (40) | Window artifact timeline analysis | 2.63 | X | |
Analyze mobile OS (Android/iOS, etc.) artifact timeline | 3.93 | O | ||
Analyze file MAC timeline | 4.10 | O | ||
Analyze action through timeline | 4.13 | O | ||
Apply credible time stamp | 3.60 | O | ||
Average Validity of Usage Information | 3.68 | |||
Additional Function (30), (33) | Provide prompt file search | 3.77 | O | |
Analyze large file searches | 3.53 | O | ||
Analyze existence of unauthorized files | 3.90 | O | ||
Search for encrypted files and decrypt | 3.70 | O | ||
Analyze hidden files by changing the extension | 3.93 | O | ||
Derive hash values for searched files | 3.73 | O | ||
File searches including personal information | 2.83 | X | ||
Average Validity of Additional Functions | 3.63 |
Existing Work Environment | Outside the Organization Environment | Within the Organization Guideline | System Information | Terminal Information | User Information | Usage Information | Additional Function |
---|---|---|---|---|---|---|---|
Outside the organization environment | 1 | 3.70 | 3.79 | 3.89 | 3.89 | 3.97 | 3.48 |
Within the organization guideline | 1 | 3.01 | 3.21 | 2.71 | 3.28 | 3.13 | |
System information | 1 | 2.82 | 2.02 | 2.21 | 2.32 | ||
Terminal information | 1 | 2.29 | 1.52 | 0.65 | |||
User information | 1 | 3.01 | 2.33 | ||||
Usage information | 1 | 1.29 | |||||
Additional function | 1 |
Smart Work Environment | Outside the Organization Environment | Within the Organization Guideline | System Information | Terminal Information | User Information | Usage Information | Additional Function |
---|---|---|---|---|---|---|---|
Outside the organization environment | 1 | 2.94 | 3.07 | 2.58 | 3.89 | 3.01 | 3.32 |
Within the organization guideline | 1 | 2.86 | 2.96 | 3.24 | 3.48 | 3.48 | |
System information | 1 | 0.68 | 0.60 | 2.12 | 2.45 | ||
Terminal information | 1 | 1.63 | 1.42 | 0.51 | |||
User information | 1 | 2.40 | 2.11 | ||||
Usage information | 1 | 3.36 | |||||
Additional function | 1 |
Area | Weighting | Gap | ||
---|---|---|---|---|
Existing Work Environment | Smart Work Environment | |||
Policy readiness | Outside the organization environment | 37.2 | 32.4 | −4.8 |
Within the organization guideline | 21.7 | 23.8 | 2.1 | |
Subtotal | 58.9 | 56.2 | - | |
Technical readiness | System information | 13.0 | 9.7 | −3.3 |
Terminal information | 5.7 | 8.7 | 3 | |
User information | 10.7 | 12.1 | 1.4 | |
Usage information | 6.2 | 8.4 | 2.2 | |
Additional function | 5.5 | 4.9 | −0.6 | |
Subtotal | 41.1 | 43.8 | - | |
Total | 100.0 | 100.0 | - |
Area (Weight) | Component and Description | |
---|---|---|
Policy readiness | Outside the organization environment (32.4) | -Adhere to digital forensics related standards/guidelines: Secure integrity/reliability of digital evidence by adhering to digital forensics related standards/guidelines -Adhere to legal requirements: Adhere to legal procedure (secure suitability/objectivity) -Establish single contact point with law enforcement organizations: Establish single contact point with law enforcement organizations for continuous interactions regarding court cases |
Within the organization guideline (23.8) | -Prepare forensics solutions (proactive/detailed analysis tools): Secure proactive evidence collection system through preparation of forensics solution -Prepare forensics equipment (writing prevention devices, copiers, etc.): Secure proactive evidence collection system through preparation of forensics equipment -Identify and categorize information assets: Identify and categorize information assets for effective administration of information assets -Secure confidentiality agreements, etc.: Secure confidentiality agreements, etc. to reinforce organization members’ security consciousness and responsibility -Establish evidence preservation system (server): Maintain safe preservation and integrity of original evidence through construction of evidence preservation system (server) -Use proven forensics tools: Secure the reliability/objectivity of forensic tools -Create an exclusive forensics department (personnel): Create an exclusive department (personnel) to conduct an effective digital forensic -Educate and train employees considering environmental change: Educate and train employees periodically to cope with rapidly changing environments -Establish evidence preservation policy: Maintain safe preservation and integrity of original evidence through the construction of an evidence preservation policy -Establish personnel audit policy: Secure legitimacy of internal audit | |
Technical readiness | System information (9.7) | -Analyze basic system information: Analyze the system environment by analyzing the basic system information -Analyze system on/off time: Analyze the system environment analysis by analyzing the system on/off time -Analyze the installed program breakdown: Analyze the system environment by analyzing the installed program breakdowns -Analyze the auto-execution program breakdown: Analyze the system environment by analyzing the auto-execution program list -Analyze the network information: Analyze the network environment such as IP/MAC Address and bandwidth -Analyze shared folder breakdown: Analyze the network environment such as shared folder breakdown -Analyze the external storage memory connection breakdown: Analyze the user’s act of usage to confirm whether to use external storage memory -Analyze anti-forensic trace: Analyze the user’s act of usage to confirm whether to conduct anti-forensic -Analyze virtualization environment construction trace analysis: Analyze the user’s act of usage to confirm whether to construct a virtualization environment -Analyze the cloud service synchronization breakdown: Analyze the user’s act of usage analysis to confirm whether to utilize the cloud service |
Terminal information (8.7) | -Collect/gain flash memory: Gain flash memory data for terminal analysis -Collect/gain microSD cards: Gain microSD cards data for terminal analysis -Collect/gain USIM cards: Gain USIM cards for terminal analysis -Collect/gain virtual machine image: Collect/gain virtual machine image for virtualization environment analysis in the case of virtualization environment-built terminals | |
User Information (12.1) | -Analyze user account information: Analyze basic information on user account -Analyze visited website information: Analyze the user’s website usage pattern -Analyze the portal search word: Analyze the user’s website usage pattern -Analyze the recently opened document: Analyze the user’s document data (local system) act of use -Analyze recently executed programs: Analyze the user’s application program act of use -Analyze the executed command: Analyze the user’s command act of usage -Analyze the user’s used service: Analyze the user’s service act of use | |
Usage Information (8.4) | -Analyze Mobile OS (Android/iOS, etc.) artifact timeline: Analyze OS artifact timeline of primary mobile terminal -Analyze MAC file timeline analysis: Analyze the user’s file usage pattern according to flow of time -Analyze action through the timeline: Analyze the user’s action according to the flow of time -Apply a credible time stamp: Apply a credible time stamp to clearly confirm the flow of time | |
Additional Function (4.9) | -Provide prompt file search: Provide file searches for prompt digital forensic performance -Search and analyze large files: Provide large file searches to analyze cloud computing servers retaining large files -Analyze the existence of unauthorized files: Provide searches to confirm if they are authorized -Search for encrypted files and decrypt: Provide searches for encrypted file analysis -Analyze hidden files by changing the extension: Provide searches for hidden files analysis -Derive hash values for searched files: Derive hash values to enhance search reliability |
Major components of proactive forensic activity | -Information Security Management & Evidence Management Framework (i.e., policies, standards, guidance) -Security awareness training (i.e., stakeholder, general user) Administrative, technical, physical control mechanisms (e.g., operating procedures, tools and equipment, specialized technical skills) -Organizational, regulatory, and legal compliance requirements |
Major components of reactive forensic activity | -Incident response capabilities -Security incident response team (SIRT) -Computer (security) incident response team -Disaster recovery planning (DRP) -Business continuity planning (BCP) -Information security gap analysis and recommendations |
Area | Weighting | |
---|---|---|
Existing Work Environment | Smart Work Environment | |
System information | 13.0 | 9.7 |
Terminal information | 5.7 | 8.7 |
User information | 10.7 | 12.1 |
Usage information | 6.2 | 8.4 |
Additional function | 5.5 | 4.9 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Park, S.; Kim, Y.; Park, G.; Na, O.; Chang, H. Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment. Sustainability 2018, 10, 1203. https://doi.org/10.3390/su10041203
Park S, Kim Y, Park G, Na O, Chang H. Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment. Sustainability. 2018; 10(4):1203. https://doi.org/10.3390/su10041203
Chicago/Turabian StylePark, Sangho, Yanghoon Kim, Gwangmin Park, Onechul Na, and Hangbae Chang. 2018. "Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment" Sustainability 10, no. 4: 1203. https://doi.org/10.3390/su10041203
APA StylePark, S., Kim, Y., Park, G., Na, O., & Chang, H. (2018). Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment. Sustainability, 10(4), 1203. https://doi.org/10.3390/su10041203