Abstract
Digital forensic investigators are faced with multimedia retrieval and discovery challenges that require innovation and application of evolving methodologies. This work is made more difficult in critical infra-structure environments where the acquired evidence is in many formats, types and presentations. Penetration testing is one of the techniques used to focus an investigation and to target the potential case information from the vulnerability identification phase, through to the media identification phase. In this chapter a review of these processes is made and a framework example developed to show how the investigator discovers relevant evidence. The problem for the digital investigator is the vast array of media in which evidence is stored or transmitted. Some work is from live retrieval and others static. A framework of methods that is flexible and adaptable to the context of investigation is proposed and the discovery methods for multimedia environments elaborated.
Reference30 articles.
1. Phillips DM, Mazzuchi TA, Sarkani S. An architecture, system engineering, and acquisition approach for space system software resiliency. Information and Software Technology. 2018;94:150-164
2. Khader M, Hadi A, Al-Naymat G. HDFS file operation fingerprints for forensic investigations. Digital Investigation. 2018;24:50-61
3. Choure C, Patil LH. A Literature Survey on Intrusion Detection and Protection System using Data Mining. International Journal of Advance Research, Ideas and Innovations in Technology 2018;4:1
4. Regulation P. Regulation (EU) 2016/679 of the European Parliament and of the Council. REGULATION (EU). 2016;p.679
5. Qiu S, Liu J, Shi Y, Li M, Wang W. Identity-based private matching over outsourced encrypted datasets. IEEE Transactions on cloud Computing. 2015;23;6(3):747-59