Affiliation:
1. Faculty of Informatics Masaryk University Brno Czechia
Abstract
AbstractSoftware engineers widely acknowledge the inclusion of security requirements in the early stages of the development process. However, the need to prepare the software for the failure of the implemented security controls and subsequent investigation of the incident is often not discussed. Forensic‐ready software systems represent an evolution of secure systems being designed for the eventual digital forensic investigation. However, their exact properties remain largely unexplored, beyond preliminary high‐level conceptualizations of requirements and capabilities. Further obstacles hindering the adoption of forensic‐ready software systems are the different priorities and goals of involved parties and a gap in the digital forensics expertise of software engineers. In this paper, we conduct an empirical qualitative study identifying the problems and needs of forensic readiness while framing the notion of an ideal forensic‐ready software system and how it should treat potential evidence. To this end, we conducted semisupervised interviews with digital forensics experts on their idea, experience, and suggestions. The results provide insights into the needs of the experts to facilitate the definition of correct requirements towards forensic‐ready software systems to support the anticipated investigations properly.
Reference60 articles.
1. PalmerG.A road map for digital forensic research.Report From the First Digital Forensic Research Workshop (DFRWS). DTR‐T001‐01 Utica NY USA DFRWS;2001. Collective work of all DFRWS attendees.
2. TanJ.Forensic readiness.Cambridge MA USA @stake Inc.;2001.
3. A ten step process for forensic readiness;Rowlingson R;International Journal of Digital Evidence,2004
4. PasqualeL AlrajehD PeersmanC TunT NuseibehB RashidA.Towards forensic‐ready software systems. In: Proceedings of the 40th international conference on software engineering: new ideas and emerging results.Association for Computing Machinery. ACM;2018:9‐12.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献