{"title":"An ML based Digital Forensics Software for Triage Analysis through Face Recognition","authors":"Gaurav Gogia, Parag Rughani","doi":"10.58940/1558-7223.1772","DOIUrl":"https://doi.org/10.58940/1558-7223.1772","url":null,"abstract":"","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129047198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olga Angelopoulou, Andrew Jones, G. Horsman, Seyedali Pourmoafi
{"title":"A Study of the Data Remaining on Second-Hand Mobile Devices in the UK","authors":"Olga Angelopoulou, Andrew Jones, G. Horsman, Seyedali Pourmoafi","doi":"10.58940/1558-7223.1785","DOIUrl":"https://doi.org/10.58940/1558-7223.1785","url":null,"abstract":"","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132995691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of Product Liability for AI Entities with special reference to the Consumer Protection Act, 2019","authors":"P. Roy, Rituraj Bhowal","doi":"10.58940/1558-7223.1820","DOIUrl":"https://doi.org/10.58940/1558-7223.1820","url":null,"abstract":"","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126942442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Orunsolu Abdul Abiodun, Sodiya A.S, Kareem S.O, Oladimeji G. B
{"title":"Performance Assessment of some Phishing predictive models based on Minimal Feature corpus","authors":"Orunsolu Abdul Abiodun, Sodiya A.S, Kareem S.O, Oladimeji G. B","doi":"10.58940/1558-7223.1692","DOIUrl":"https://doi.org/10.58940/1558-7223.1692","url":null,"abstract":"The credentials harvested normally include bank account numbers, passwords or PINs, credit card numbers, security questions, security codes etc. In most instances, vulnerability to phishing threat is due to the ease with which unsuspecting online users navigate web pages using links or URL within a body of an online message (Han et al. 2012). [...]there is an increased motivation for phishers as the number of mobile-connected devices accessing social media sites continues to grow. The limitation is often connected with superfluous training/testing time which may result in high memory overheads, delay in detection time, expensive maintenance/update etc. [...]responsiveness is used to measure prediction accuracy with commensurate processing time while the response time is used to ensure that the detection time for any window of vulnerability is reasonable and insignificant (Silva et al. 2020). In this work, we proposed an approach to examining the different state of art predictive model using reduced phishing feature corpus to resolve the uncertainties that result from performance issues (responsiveness) and other inconsistencies (response time, computational overhead etc.) in the feature set corpus.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131381377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Don't Bite the Bait: Phishing Attack for Internet Banking (E-Banking)","authors":"Ilker Kara","doi":"10.58940/1558-7223.1743","DOIUrl":"https://doi.org/10.58940/1558-7223.1743","url":null,"abstract":"Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirection, panic, curiosity, or excitement. Most phishing websites are designed on internet banking(e-banking), and the attackers can acquire financial information of misled users with the tactics and discourses they develop. Despite the increase of prevention techniques against phishing attacks day by day, an effective solution could not be found for this issue due to the human factor. Because of this reason, attackers’ attack techniques and strategies from actual phishing attacks are essential to study and analyze. This study focused on the detection and analysis of a real e-banking phishing attack using the phishing website. Analysis results show that the attacker’s information is traceable.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130923754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The survey on cross-border collection of digital evidence by representatives from Polish prosecutors' offices and judicial authorities","authors":"Paweł Olber","doi":"10.58940/1558-7223.1700","DOIUrl":"https://doi.org/10.58940/1558-7223.1700","url":null,"abstract":"Dynamic development of IT technology poses new challenges related to the cross-border collection of electronic evidence from the cloud. Many times investigators need to secure data stored on foreign servers directly and then look for solutions on how to turn the data into a legitimate source of evidence. To study the situation and propose solutions, I conducted a survey among Polish representatives of public prosecutors’ offices and courts. This paper presents information from digital evidence collection practices across multiple jurisdictions. I stated that representatives from the prosecution and the judiciary in Poland are aware of the issues associated with cross-border acquisition and preservation of cloudbased evidence. In their view, many of the problems are time-consuming and ineffective international cooperation, the voluntary nature of cooperation between foreign cloud service providers, lack of harmonized procedures and guidelines, the diversity of legal systems, and the lack of knowledge held by law enforcement officials and the judiciary. This work should be the beginning of an open discussion with practitioners about existing challenges and an invitation for further research with a larger sample of prosecutors and judges. There are no such studies in literature. The paper shows that it is possible to improve current procedures for the cross-border collection of cloud-based digital evidence.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114000846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things Software and Hardware Architectures and Their Impacts on Forensic Investigations: Current Approaches and Challenges","authors":"Abel Alex Boozer, Aruni John, Tathagata Mukherjee","doi":"10.58940/1558-7223.1759","DOIUrl":"https://doi.org/10.58940/1558-7223.1759","url":null,"abstract":"The never-before-seen proliferation of interconnected low-power computing devices, patently dubbed the Internet of Things (IoT), is revolutionizing how people, organizations, and malicious actors interact with one another and the Internet. Many of these devices collect data in different forms, be it audio, location data, or user commands. In civil or criminal nature investigations, the data collected can act as evidence for the prosecution or the defense. This data can also be used as a component of cybersecurity efforts. When data is extracted from these devices, investigators are expected to do so using proven methods. Still, unfortunately, given the heterogeneity in the types of devices that need to be examined, few widely agreed-upon standards exist. In this paper, we look at some of the architectures, current frameworks, and methods available to perform forensic analysis of IoT devices to provide a roadmap for investigators and researchers to form the basis of an investigation.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126440433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital Forensic Readiness Framework based on Honeypot and Honeynet for BYOD","authors":"Audrey Asante, Vincent Amankona","doi":"10.58940/1558-7223.1706","DOIUrl":"https://doi.org/10.58940/1558-7223.1706","url":null,"abstract":"The utilization of the internet within organizations has surged over the past decade. Though, it has numerous benefits, the internet also comes with its own challenges such as intrusions and threats. Bring Your Own Device (BYOD) as a growing trend among organizations allow employees to connect their portable devices such as smart phones, tablets, laptops, to the organization’s network to perform organizational duties. It has gained popularity over the years because of its flexibility and cost effectiveness. This adoption of BYOD has exposed organizations to security risks and demands proactive measures to mitigate such incidents. In this study, we propose a Digital Forensic Readiness (DFR) framework for BYOD using honeypot technology. The framework consists of the following components: BYOD devices, Management, People, Technology and DFR. It is designed to comply with ISO/IEC 27043, detect security incidents/threats and collect potential digital evidence using lowand high-level interaction honeypots. Besides, the framework proffers adequate security support to the organization through space isolation, device management, crypto operations, and policies database. This framework would ensure and improve information security as well as securely preserve digital evidence. Embedding DFR into BYOD will improve security and enable an organization to stay abreast when handling a security incident.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122218157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Economical Method for Securely Disintegrating Solid-State Drives Using Blenders","authors":"Brandon J. Hopkins, Kevin A. Riggle","doi":"10.58940/1558-7223.1681","DOIUrl":"https://doi.org/10.58940/1558-7223.1681","url":null,"abstract":"Pulverizing solid-state drives (SSDs) down to particles no larger than 2 mm is required by the United States National Security Agency (NSA) to ensure the highest level of data security, but commercial disintegrators that achieve this standard are large, heavy, costly, and often difficult to access globally. Here, we present a portable, inexpensive, and accessible method of pulverizing SSDs using a household blender and other readily available materials. We verify this approach by pulverizing SSDs with a variety of household blenders for fixed periods of time and sieve the resulting powder to ensure appropriate particle size. Among the 6 household blenders tested, sharp-blade blenders with high peak power (1,380 W) and high blade speed (28,000 RPM) properly disintegrate 2.5-inch SSDs in less than 20 min. This method is useful for pulverizing small numbers of SSDs that contain secret information when on-site conventional disintegrators are not available or practical.","PeriodicalId":351663,"journal":{"name":"J. Digit. Forensics Secur. Law","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120948794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}