{"title":"Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks","authors":"B. Fakiha","doi":"10.58346/jowua.2024.i1.008","DOIUrl":null,"url":null,"abstract":"As critical infrastructure networks become more interconnected and digitalized, they confront increased cyber threats fueled by the growing adoption of digitalized working and general operation methods around the world. This research delves into the complex topic of critical infrastructure network security by examining the hidden challenges and best forensic techniques used to safeguard these crucial systems. The study utilizes a comprehensive data collection approach that integrates an experiment and a case study to provide an in-depth understanding of this essential subject. It assesses the efficacy of various digital forensic procedures customized for critical infrastructure network protection by using meticulously designed experiments within controlled simulated environments. The findings highlight the wide range of challenges and threats that organizations tasked with maintaining and securing these networks encounter. The case study illuminates how forensic practices can be used in incident response and recovery situations. The results highlight the significance of a diversified approach to safeguarding critical infrastructure networks. They emphasize the need for modern methods and practices, such as blockchain technology and Artificial intelligence, by analyzing findings from the experiment and the case study.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"6 5","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58346/jowua.2024.i1.008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0
Abstract
As critical infrastructure networks become more interconnected and digitalized, they confront increased cyber threats fueled by the growing adoption of digitalized working and general operation methods around the world. This research delves into the complex topic of critical infrastructure network security by examining the hidden challenges and best forensic techniques used to safeguard these crucial systems. The study utilizes a comprehensive data collection approach that integrates an experiment and a case study to provide an in-depth understanding of this essential subject. It assesses the efficacy of various digital forensic procedures customized for critical infrastructure network protection by using meticulously designed experiments within controlled simulated environments. The findings highlight the wide range of challenges and threats that organizations tasked with maintaining and securing these networks encounter. The case study illuminates how forensic practices can be used in incident response and recovery situations. The results highlight the significance of a diversified approach to safeguarding critical infrastructure networks. They emphasize the need for modern methods and practices, such as blockchain technology and Artificial intelligence, by analyzing findings from the experiment and the case study.
期刊介绍:
JoWUA is an online peer-reviewed journal and aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to wireless mobile networks, ubiquitous computing, and their dependable applications. JoWUA consists of high-quality technical manuscripts on advances in the state-of-the-art of wireless mobile networks, ubiquitous computing, and their dependable applications; both theoretical approaches and practical approaches are encouraged to submit. All published articles in JoWUA are freely accessible in this website because it is an open access journal. JoWUA has four issues (March, June, September, December) per year with special issues covering specific research areas by guest editors.