Dilemmas in Digital Forensics for Computer Equipment Security and Maintenance in Remote Ships

Article Preview

Abstract:

As remote ships have equipped a large number of computer equipments, the maintenance of such equipments confronts a great challenge. Since some embedded devices among them may be hacked by attackers or disabled by Byzantine failure, to discover the attacking originality and fault source present foremost importance. In this article, we discuss digital investigation and forensics as a general viewpoint. We point out some dilemmas that hinder the development of digital forensics, some of which may be fundamental problems. We propose to expand the concept of digital forensics to a wider scope so as to include digital investigation for information instead of only evidence. We also argue that the fostering of novel contributions should be relied on technical experts instead of law experts as emerging new techniques always result in new digital crimes. We promote the divorce between the technical experts who focus on the contribution of technologies, and legal authorities who are responsible to bridge the gap between technologies and standard/formalization. Digital forensics methods are encouraged to be publicly available, but the contributors should be aware of the possibility of anti-forensics.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 490-495)

Pages:

1382-1386

Citation:

Online since:

March 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] The Honeynet Project, Know Your Enemy. 2nd ed. Addison-Wesley, (2004).

Google Scholar

[2] Simson L. Garfinkel, Digital forensics research: The next 10 years, Elsevier Digital Investigation, Vol. 7 (2010), p. S64 -S73.

DOI: 10.1016/j.diin.2010.05.009

Google Scholar

[3] Gary Palmer, A Road Map for Digital Forensic Research, Report from the First Digital Forensic Research Workshop (DFRWS), Technical Report DTRT0010-01 (2001).

Google Scholar

[4] Gregory A. Hall, Wilbon P. Davis, Toward Defining the Intersection of Forensics and Information Technology, International Journal of Digital Evidence, Vol. 4, Issue 1, (2005), pp.1-20.

Google Scholar

[5] Slay, Jill; Lin, Yi-Chi; Turnbull, Benjamin; Towards a Formalization of Digital Forensics, Advances in Digital Forensics, IFIP Advances in Information and Communication Technology V, Vol. 306, Springer Berlin Heidelberg, (2009), pp.37-47.

DOI: 10.1007/978-3-642-04155-6_3

Google Scholar

[6] J. Kornblum, Standardizing Digital Evidence Storage, Communications of the ACM, (2006).

Google Scholar

[7] Ryan Leigland, A Formalization of Digital Forensics, International Journal of Digital Evidence, Vol. 3, Issue 2, (2004), pp.1-32.

Google Scholar

[8] Matthew Meyers, Marc Rogers, Computer Forensics: The Need for Standardization and Certification, International Journal of Digital Evidence, Volume 3, Issue 2, 2004, 1-11.

Google Scholar

[9] Information on http: /www. ioce. org.

Google Scholar

[10] Information on http: /www. swgde. org.

Google Scholar

[11] Information on http: /www. iso27001security. com/html/27037. html.

Google Scholar