Bibliography

Adams, Richard. The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice. 2013. https://www.researchgate.net/publication/258224615_The_Advanced_Data_Acquisition_Model_ADAM_A_process_model_for_digital_forensic_practice.

Agrawal, Ankit, Megha, Gupta, Saurabh Gupta, Subhash Chandra. Systematic digital forensic investigation model. International Journal of Computer Science and Security (IJCSS), vol. 5, no. 1, 118–131, 2011.

Ahmad, Atif. The forensic chain-of-evidence model: Improving the process of evidence Collection in incident handling procedures. doi:10.1.1.87.8677. 2002.

Alabdulsalam, Saad, Schaefer, Kevin, Kechadi, Tahar, Le-Khac, Nhien-An. Internet of Things forensics: challenges and case study. 2018. https://arxiv.org/ftp/arxiv/papers/1801/1801.10391.pdf.

Alberts, Christopher, Dorofee, Audrey, Stevens, James, Woody, Carol. Introduction to the OCTAVE approach. Carnegie Mellon University, 2003. http://resources.sei.cmu.edu/asset_files/UsersGuide/2003_012_001_51556.pdf.

Alenezi, Ahmed, Hussein, Raid, Wills, Gary. A framework for cloud forensic readiness in organizations. 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, 2017. https://ieeexplore.ieee.org/document/7944896.

American Bar Association. E-Discovery and electronic evidence in the courtroom. Business Law Today, vol. 17, no. 1, 2007. https://apps.americanbar.org/buslaw/blt/2007-09-10/chorvat.shtml.

Association of Chief Police Officers. Good practice guide for computer-based electronic evidence. 2007. http://www.7safe.com/electronic_evidence/ACPO_guidelines_computer_evidence.pdf.

Australian Government—Civil Aviation Safety Authority. Cost benefit analysis methodology procedures manual. 2007. http://www.casa.gov.au/scripts/257r005.pdf.

Australian Signal Directorate. Strategies to mitigate targeted cyber intrusions. Australian Government—Department of Defense, 2014. http://www.asd.gov.au/infosec/mitigationstrategies.htm.

Ayers, Rick, Brothers, Sam, Jansen, Wayne. Special Publication 800–101 Revision 1: Guidelines on Mobile Device Forensics. National Institute of Standards and Technology (NIST), Gaithersburg, MD, 2014. https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-101r1.pdf.

Bahadur, Parinita. Difference between guideline, procedure, standard and policy. 2014. http://www.hrsuccessguide.com/2014/01/Guideline-Procedure-Standard-Policy.html.

Baryamureeba, Venansius, Tushabe, Florence. The Enhanced Digital Investigation Process Model. Institute of Computer Science, Makerere University, Kampala Uganda, 2004. http://dfrws.org/2004/day1/Tushabe_EIDIP.pdf.

Beebe, Nicole Lang, Clark, Jan Guynes. A hierarchical, objectives-based framework for the digital investigations process. Digital Forensics Research Workshop (DFRWS), vol. 2, no. 2, 147–167, 2004. http://www.dfrws.org/2004/day1/Beebe_Obj_Framework_for_DI.pdf.

Bem, Derek, Huebner, Ewa. Computer forensic analysis in a virtual environment. International Journal of Digital Evidence, vol. 6, no. 2, 2007. https://www.utica.edu/academic/institutes/ecii/publications/articles/1C349F35-C73B-DB8A-926F9F46623A1842.pdf.

Bennett, Brian T. Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel. John Wiley & Sons, Hoboken, NJ, 2007.

Betts, Dominic, Shahan, Robin. Internet of Things security architecture. Microsoft, 2018. https://docs.microsoft.com/en-us/azure/iot-accelerators/iot-security-architecture.

Bragg, Roberta. CISSP Training Guide. Pearson IT Certification, 2002.

Bretherton, Francis P., Singley, Paul. T. Metadata: A User’s View. IEEE, 1994. https://ieeexplore.ieee.org/document/336950.

Brunty, Josh. Validation of Forensic Tools and Software: A Quick Guide for the Digital Forensic Examiner. Forensic Magazine, 2011. http://www.forensicmag.com/articles/2011/03/validation-forensic-tools-and-software-quick-guide-digitalforensic-examiner.

Business Dictionary. Jurisdiction. WebFinance Inc, 2017. http://www.businessdictionary.com/definition/jurisdiction.html.

Campagna, Rich, Iyer, Subbu, Krishnan, Ashwin. Mobile Device Security for Dummies. John Wiley & Sons, 2011. https://www.amazon.ca/Mobile-Device-Security-Dummies-Campagna/dp/0470927534.

Canadian Government—Treasury Board of Canada Secretariat. Canadian cost-benefit analysis guide: Regulatory proposals. 2007. http://www.tbs-sct.gc.ca/rtrap-parfa/analys/analys-eng.pdf.

Carminati, F., Betev, L., Grigoras, A. Grid and Cloud Computing: Concepts and Practical Applications. IOS Press, 2016. https://www.iospress.nl/book/grid-and-cloud-computing-concepts-and-practical-applications/.

Carnegie, Mellon. CMMISM for Software Engineering (CMMI-SW, V1.1). 2002. http://resources.sei.cmu.edu/asset_files/TechnicalReport/2002_005_001_14069.pdf.

Carrier, Brian D., Spafford, Eugene H. An event-based digital forensic investigation framework. 2004. http://www.digital-evidence.org/papers/dfrws_event.pdf. Digital Forensics Research Workshop (DFRWS).

Casey, Eoghan. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet. Academic Press, San Diego, CA, 2000.

Casey, Eoghan. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet. 3rd ed. Academic Press, 2011. https://www.elsevier.com/books/digital-evidence-and-computer-crime/casey/978-0-08-092148-8.

Ceresini, T. Maintaining the forensic viability of log files. System Administration, Networking, and Security Institute (SANS)—Global Information Assurance Certification (GIAC), 2001. http://www.giac.org/paper/gsec/801/maintaining-forensic-viability-log-files/101724.

Chike, Chike Patrick, D.Sc. The legal challenges of Internet of Things. 2018. https://www.researchgate.net/publication/322628457_The_Legal_Challenges_of_Internet_of_Things.

Choi, Seul-Ki, Yang, Chung-Huang, Kwak, Jim. Security hardening and security monitoring for IoT devices to mitigate IoT security vulnarabilities and threats. Transactions on Internet and Information Systems, vol. 12, no. 2, 2018. http://www.itiis.org/digital-library/manuscript/file/1937/TIIS+Vol+12,+No+2-22.pdf.

Choksy, Carol E.B. 8 Steps to develop a taxonomy. The Information Management Journal, 2006. http://www.arma.org/bookstore/files/Choksy.pdf.

Chow, Kam-Pui, Shenoi, Sujeet (Eds.). Advances in digital forensics VI. Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, 2010. http://www.springer.com/us/book/9783642155055.

Ciardhuáin, Séamus Ó. An extended model of cybercrime investigations. International Journal of Digital Evidence, vol. 3, no. 1, 2004. https://www.utica.edu/academic/institutes/ecii/publications/articles/A0B70121-FD6C-3DBA-0EA5C3E93CC575FA.pdf.

Cichonski, Paul, Millar, Tom, Grance, Tim, Scarfone, Karen. Computer Security Incident Handling Guide. National Institute of Standards and Technology (NIST), Gaithersburg, MD, 2012. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf.

Cloud Security Alliance. Quick Guide to the Reference Architecture: Trusted Cloud Initiative. 2011. https://cloudsecurityalliance.org/wp-content/uploads/2011/10/TCI_Whitepaper.pdf.

Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. 2011. https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf.

Communication safety establishment harmonized threat and risk assessment methodology. Royal Canadian Mounted Police, 2007. https://www.cse-cst.gc.ca/en/system/files/pdf_documents/tra-emr-1-e.pdf.

Computer Ethics Institute. The ten commandments of computer ethics. 1992.

Contesti, Diana-Lynn et al. Official (ISC)2 Guide to the SSCP CBK. Auerbach Publications, 2007. https://www.crcpress.com/Official-ISC2-Guide-to-the-SSCP-CBK/Contesti-Tipton/p/book/9780429195990.

Cornell University Law School. Admissible evidence. 2014. https://www.law.cornell.edu/wex/admissible_evidence.

Cornell University Law School. Brady rule. 2014. https://www.law.cornell.edu/wex/brady_rule.

Cornell University Law School. Daubert standard. 2015. https://www.law.cornell.edu/wex/daubert_standard.

Cornell University Law School. Federal rules of civil procedure. 2014. https://www.law.cornell.edu/rules/frcp/.

Cornell University Law School. Federal rules of evidence. https://www.law.cornell.edu/rules/fre. 2014.

de Rus, Gines. Introduction to Cost-Benefit Analysis. Edward Elgar Publishing Inc., Cheltenham, UK, 2010.

Digital Forensics Certification Board. Code of Ethics and Standards of Professional Conduct. 2016. https://dfcb.org/code-of-ethics-and-standards-of-professional-conduct/.

Dull, Tamara. Data lake versus data warehouse: Key differences. KDnuggets, 2015. https://www.kdnuggets.com/2015/09/data-lake-vs-data-warehouse-key-differences.html.

Dykstra, Josiah, Sherman, Alan. Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing. Digital Forensics Research Workshop (DFRWS), 2012. https://www.dfrws.org/sites/default/files/session-files/pres-acquiring_forensic_evidence_from_infrastructure-as-a-service_cloud_computing.pdf.

Emmanuel, S. Pilli, Joshi, R.C., Niyogi, Rajdeep. A generic framework for network forensics. International Journal of Computer Applications, vol. 1, no. 11, 2010. http://www.ijcaonline.org/journal/number11/pxc387408.pdf.

Felix, C. Freiling, Schwittay, Bastian. A common process model for incident response and computer forensics. Laboratory for Dependable Distributed Systems, University of Mannheim, Germany, 2007. https://www1.informatik.uni-erlangen.de/filepool/publications/imf2007-common-model.pdf.

Fenu, Gianni, Solinas, Fabrizio. Computer forensics investigation an approach to evidence in cyberspace. http://sdiwc.net/digital-library/download.php?id=00000541.pdf.

Fernando, A.C. Business Ethics and Corporate Governance. Pearson Education India, Harlow, UK, 2010.

Finkle, Jim, Heavey, Susan. UPDATE 2-target says it declined to act on early alert of cyber breach. Reuters, 2014. http://www.reuters.com/article/2014/03/13/target-breach-idUSL2N0MA1MW20140313.

Foote, Keith D. A brief history of The Internet of Things. Dataversity, 2016. http://www.dataversity.net/brief-history-internet-things.

ForensicFocus. Computer forensics education. 2015. http://www.forensicfocus.com/education.

Forrester. Application control: An essential endpoint security component. 2012. http://www.forrester.com/Application+Control+An+Essential+Endpoint+Security+Component/fulltext/-/E-RES78502.

Forrester. Prepare for anywhere, anytime, any-device engagement with a stateless mobile architecture. 2012. http://www.forrester.com/Prepare+For+Anywhere+Anytime+AnyDevice+Engagement+With+A+Stateless+Mobile+Architecture/fulltext/-/E-RES61569.

Garrison. Clint P. Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data. Syngress, Burlington, MA, 2010.

Gartner Research. Enterprise endpoint protection when the consumer is king. 2013. http://www.gartner.com/document/2402415.

Gerge, Mohay, Anderson, Alison, Collie, Byron, De Vel, Olivier, McKemmish, Rodnet. Computer and Intrusion Forensics. Artech House, Burlington, MA, 2003.

Ghorbani, A.A., Lu, W., Tavallaee, M. Network Intrusion Detection and Prevention Concepts and Tecnniques. Springer, Berlin, Germany, 2010.

Goodwin, Richard. The history of mobile phones from 1973 To 2008: The handsets that made it ALL Happen. Know Your Mobile, 2016.

Gregory, Peter. CISSP Guide to Security Essentials. Nelson Education, Toronto, Canada, 2014.

Grobler, C.P., Louwrens, C.P. Digital forensic readiness as a component of information security best practice. In Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (Eds.), New Approaches for Security, Privacy and Trust in Complex Environments. SEC 2007. IFIP International Federation for Information Processing, Vol. 232. Springer, Boston, MA, 2007.

Harrington, Sean. Professional ethics in the digital forensics discipline: Part 1. Forensic Magazine, 2014. https://www.forensicmag.com/article/2014/06/professional-ethics-digital-forensics-discipline-part-2.

Harrington, Sean. Professional ethics in the digital forensics discipline: Part 2. 2014.

Harris, Elizabeth A., Perlroth, Nicole. Target missed signs of a data breach. New York Times, 2014. http://www.nytimes.com/2014/03/14/business/target-missed-signs-of-a-data-breach.html?_r=0.

Hay, David C. Requirements Analysis: From Business Views to Architecture. Prentice Hall Professional, Upper Saddle River, NJ, 2003.

Hegarty, R.C. Lamb, D.J., Attwood, A. Digital evidence challenges in the internet of things. Proceedings of the Ninth International Workshop on Digital Forensics and Incident Analysis, 2016. https://www.cscan.org/openaccess/?id=231.

Hernan, Shawn, Lambert, Scott, Ostwald, Tomasz, Shostack, Adam. Uncover security design flaws using the STRIDE approach. MSDN Magazine, pp. 68–75, 2006. https://msdn.microsoft.com/en-us/magazine/cc163519.aspx.

Hernandez, Steven. Official Guide to the CISSP CBK, 3rd ed. CRC Press, Boca Raton, FL, 2012.

HG Legal Resources. Information technology law. HGEXPERTS, 2015. http://www.hg.org/information-technology-law.html.

Hoog, Andrew. Android Forensics: Investigation, Analysis, and Mobile Security for Google Android. Elsevier, New York, 2011.

Ieong, Ricci S.C. FORZA: Digital Forensics Investigation Framework that Incorporate Legal Issues. Elsevier, 2006. http://www.dfrws.org/2006/proceedings/4-Ieong.pdf.

InfoSec Reading Room. An Overview of Threat and Risk Assessment. SANS Institute, Redmond, WA, 2002. http://www.sans.org/reading-room/whitepapers/auditing/overview-threat-risk-assessment-76.

International Association of Computer Investigative Specialists (IACIS). Code of ethics. 2017.

International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC). ISO/IEC 27005:2011 Information technology–Security techniques-Information security risk management. 2011.

International Society of Forensic Computer Examiners (ISFCE). Code of ethics and professional responsibility. 2017.

Investopedia. Market-orientation. 2015. http://www.investopedia.com/terms/m/market-orientation.asp.

Ionita, Dan, Hartel, Pieter. Current established risk assessment methodologies and tools. MS thesis. University of Twente, Enschede, the Netherlands, 2013. http://doc.utwente.nl/89558/1/%5Btech_report%5D_D_Ionita_-_Current_Established_Risk_Assessment_Methodologies_and_Tools.pdf.

ITIL v3 Study Guide. Taruu LLC, 2009. http://taruu.com/Documents/ITIL%20v3%20Foundation%20Study%20Guide%20v4.2.2.5.pdf.

Jarke, Matthias et al. Fundamentals of Data Warehouse. Springer Science & Business Media, Berlin, Germany, 2013.

Kabay, Michel E. A Brief History of Computer Crime: An Introduction for Students. 2008. http://www.mekabay.com/overviews/history.pdf.

Karake-Shalhoub, Zeinab, Al Qasimi, Lubna. Cyber Law and Cyber Security in Developing and Emerging Economies. Edward Elgar Publishing, Cheltenham, UK, 2010.

Kebande, Victor R., Karie, Nickson M., Venter, H.S. Adding digital forensic readiness as a security component to the IoT domain. International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 1, 2018. https://www.researchgate.net/profile/Victor_Kebande/publication/323384894_Adding_Digital_Forensic_Readiness_as_a_Security_Component_to_the_IoT_Domain/links/5a9ea184aca2726eed57789e/Adding-Digital-Forensic-Readiness-as-a-Security-Component-to-the-IoT-Domain.pdf.

Kedar, Thakare J. Advanced Database Management. Technical Publications, Pune, India, 2008.

Kellermanns, Dave. Data lake vs data warehouse: What’s the difference? Automic, 2016. https://automic.com/blog/what-difference-between-data-lake-and-data-warehouse.

Kemp, Richard. Legal aspects of the Internet of Things. Kemp IT Law, 2017. http://www.kempitlaw.com/wp-content/uploads/2017/06/Legal-Aspects-of-the-Internet-of-Things-KITL-20170610.pdf.

Kent, Karen, Chevalier, Suzanne, Grance, Tim, Dang, Hung. Special publication 800-86: Guide to integrating forensic techniques into incident response. NIST Special Publication, vol. 10, no. 14, 800–886, 2006. http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf.

Kissel, Richard, Stine, Kevin, Scholl, Matthew, Rossman, Hart, Fahlsing, Jim, Gulick, Jessica. Special Publication 800-64 R2: Security Considerations in the System Development Life Cycle. National Institute of Standards and Technology (NIST), Gaithersburg, MD, 2008. http://csrc.nist.gov/publications/nistpubs/800-64-Rev2/SP800-64-Revision2.pdf.

Ko, Ran, Choo, Raymond. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress, Burlington, MA, 2015.

Kohn, Michael, Eloff, J.H.P., Olivier, M.S. Framework for a Digital Forensic Investigation. Information and Computer Security Architectures Research Group (ICSA), Department of Computer Science, University of Pretoria, Hatfield, Pretoria, 2006. http://icsa.cs.up.ac.za/issa/2006/Proceedings/Full/101_Paper.pdf.

Krebs, Brian. The target breach, by the numbers. Krebs on Security, vol. 6, 2014. http://krebsonsecurity.com/2014/05/the-target-breach-by-the-numbers.

Kruse II, Warren G., Heiser, Jay G. Computer Forensics: Incident Response Essentials. Pearson, Indianapolis, IN, 2004.

Landoll, Douglas. The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, 2nd ed. CRC Press, Boca Raton, FL, 2011.

Lang, Anthony, Bashir, Masooda, Campbell, Roy, Destefano, Lizanne. Developing a new digital forensics curriculum. Digital Forensic Research Conference (DFRWS), vol. 11, S76–S84, 2014. https://www.dfrws.org/sites/default/files/session-files/paper-developing_a_new_digital_forensics_curriculum.pdf.

Law Crossing. Information Technology Attorney Job Description. Employment Research Institute, Pasadena, CA, 2015. http://www.lawcrossing.com/job-description/6048/information-technology-attorney-jobs.

Law Donut. Employment law – Discipline and grievance. 2015. http://www.lawdonut.co.uk/law/employment-law/discipline-and-grievance/disciplinary-issues-faqs#7.

Lee, H.C., Palmbach, T.M., Miller, M.T. Henry Lee's Crime Scene Handbook. Academic Press, San Diego, CA, 2001.

Legal Dictionary. Daubert test. 2008. http://legal-dictionary.thefreedictionary.com/Daubert+standard.

Linthicum, David. Three types of IoT data sources. RTInsights, 2016. https://www.rtinsights.com/three-types-of-iot-data-sources/.

Liu, Changwei, Singhal, Anoop, Wijesekera, Duminda. Identifying evidence for cloud forensic analysis. Advances in Digital Forensics XIII. Springer, Cham, Switzerland, 2017.

Lloyd, Ian. Information Technology Law. Oxford University Press, New York, 2014.

MacDonald, Neil. The future of information security is context aware and adaptive. Gartner Research, G00200385. 2010.

Malega, Peter. Escalation management as the necessary form of incident management process. Journal of Emerging Trends in Computing and Information Sciences, vol. 5, no. 6, 641–646, 2014. http://www.cisjournal.org/journalofcomputing/archive/vol5no8/vol5no8_8.pdf.

Mandia, Kevin, Prosise, Chris, Pepe, Matt. Incident Response & Computer Forensics, 2nd ed. McGraw-Hill, New York, 2003.

Marcella, Albert Jr., Menendez, Doug. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, 2nd ed. CRC Press, Boca Raton, FL, 2007.

Marquis, Hank. A Study Guide to Service Catalogue from the Principles of Itil V3, Volume 3. The Stationery Office, 2010.

Mell, Peter, Grance, Timothy. Special Publication 800-145: The NIST Definition of Cloud Computing. National Institute of Standards and Technology (NIST), Gaithersburg, MD, 2011.

Microsoft. Secure boot overview. 2014. https://technet.microsoft.com/en-ca/library/hh824987.aspx.

Microsoft. The STRIDE threat model. 2005. https://msdn.microsoft.com/en-us/library/ee823878%28v=cs.20%29.aspx.

Microsoft. threat modelling. 2003. https://msdn.microsoft.com/en-us/library/ff648644.aspx.

The MITRE Corporation. About STIX. 2015. http://stixproject.github.io/about/.

The MITRE Corporation. STIX project. 2015. http://stixproject.github.io/about/.

Morgan, Brendan. Ensuring admissibility of mobile evidence in court. The Federal Lawyer, 2015. http://www.fedbar.org/Resources_1/Federal-Lawyer-Magazine/2015/March/Features/Ensuring-Admissibility-of-Mobile-Evidence-in-Court.aspx?FT=.pdf.

Morgan, Jacob. A simple explanation of “The Internet of Things”. Forbes, 2014. https://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/#6a853cf11d09.

Murphy, Cynthia A. Developing Process for Mobile Device Forensics V3. System Administration, Networking, and Security Institute (SANS), 2013. http://www.mobileforensicscentral.com/mfc/documents/Mobile%20Device%20Forensic%20Process%20v3.0.pdf.

Murphy, National Institute of Standards and Technology (NIST). Computer Forensic Tool Testing Project. 2012. http://www.cftt.nist.gov/CFTT-Booklet-Revised-02012012.pdf.

Nelson, Bill, Phillips, Amelia, Enfinger, Frank, Steuart, Chris. Computer Forensics and Investigations. Thomson, Boston, MA, 2004.

Newsome, Bruce. A Practical Introduction to Security and Risk Management. SAGE Publications, Boston, MA, 2013.

NIST Cloud Computing Forensic Science Working Group Information Technology Laboratory. NIST Cloud Computing Forensic Science Challenges. National Institute of Standards and Technology (NIST), Gaithersburg, MD, 2014.

NIST Cloud Computing Security Working Group Information Technology Laboratory. Special Publication 500-299: NIST Cloud Computing Security Reference Architecture. National Institute of Standards and Technology (NIST), Gaithersburg, MD, 2013.

O’Loughlin, Mark. The Service Catalog: Best Practices. Van Haren, Norwich, UK, 2010.

Office of Legal Education Executive Office for United States Attorneys, Department of Justic. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. 2009. http://www.justice.gov/criminal/cybercrime/docs/ssmanual2009.pdf.

OLAP.COM. OLAP definition. 2015. http://olap.com/olap-definition/.

Open Web Application Security Project (OWASP). 2010 T10 architecture diagram. 2010. https://owasp.org/index.php?title=File:2010-T10-ArchitectureDiagram.png.

Open Web Application Security Project (OWASP). Threat modeling. 2015. https://www.owasp.org/index.php/Threat_Modeling.

Open Web Application Security Project (OWASP). Threat risk modelling. 2015. https://www.owasp.org/index.php/Threat_Risk_Modeling.

Palmer, G. 2001. A Road Map for Digital Forensic Research. First Digital Forensic Research Workshop, Utica, NY, pp. 27–30.

Peltier, Thomas R. Facilitated Risk Analysis Process (FRAP). CRC Press, 2000. http://www.ittoday.info/AIMS/DSM/85-01-21.pdf.

People’s Law Dictionary. Bad faith. 2015. http://dictionary.law.com/Default.aspx?selected=21.

Perumal, S. Digital forensic model based on Malaysian investigation process. International Journal of Computer Science and Network Security, vol. 9, no. 8, 38–44, 2009.

Peterson, Gilbert, Shenoi, Sujeet. Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference on Digital Forensics. Springer, Orlando, FL, 2013.

Pollitt, M.M. An ad hoc review of digital models. Proceeding of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE’07), Washington, DC, 2007. https://www.researchgate.net/publication/221411294_An_Ad_Hoc_Review_of_Digital_Forensic_Models.

Ponniah, Paulraj. Data Warehouse Fundamentals: A Comprehensive Guide for IT Professionals. John Wiley & Sons, 2004. https://www.amazon.com/Data-Warehousing-Fundamentals-Comprehensive-Professionals/dp/0471412546.

Porterfield, Jason. File Sharing: Rights and Risks. The Rosen Publishing Group, 2014. https://www.amazon.ca/File-Sharing-Rights-Jason-Porterfield/dp/1477776397.

Press Release: Alexey Ivanov and Vasiliy Gorshkov: Russian Hacker Roulette. CSO, 2005. http://www.csoonline.com/article/2118241/malware-cybercrime/alexey-ivanov-and-vasiliy-gorshkov--russian-hacker-roulette.html.

Press Release: FBI “hack” raises global security concerns. CNET, 2002. http://www.cnet.com/news/fbi-hack-raises-global-security-concerns/.

Press Release: Pirate Bay file-sharing trial to start in Sweden. Telegraph Media Group Limited, 2009. http://www.telegraph.co.uk/technology/8580318/Top-five-internet-piracy-battles.html.

Press Release: Profile Gary McKinnon. BBC News, 2008. http://news.bbc.co.uk/2/hi/technology/4715612.stm.

Press Release: SEC Charges Company CEO and Former CFO with Hiding Internal Controls Deficiencies and Violating Sarbanes-Oxley Requirements. U.S. Securities and Exchange Commissions, 2014. http://www.sec.gov/News/PressRelease/Detail/PressRelease/1370542561150.

Queensland Government. Identifying business risk. 2014. https://www.business.qld.gov.au/business/running/risk-management/identifying-business-risk.

Ray, Daniel A., Bradford, Phillip G. Models of models: Digital forensics and domain specific languages. Department of Computer Science, University of Alabama, Tuscaloosa, AL. http://www.ioc.ornl.gov/csiirw/07/abstracts/Bradford-Abstract.pdf.

Ray, Indrajit, Shenoi, Sujeet. Advances in Digital Forensics IV. Springer, London, UK, 2008.

ReelLawyers. Lessons of AMD v. Intel. 2013. https://www.youtube.com/watch?v=jQ_9uLkw_Uo.

Reith, M., Carr, C., Gunsch, G. An examination of digital forensics models. International Journal of Digital Evidence, vol. 1, no. 3, 2002.

Rooney, Paul. Microsoft’s CEO: 80-20 rule applies to bugs, not just features. CRN, 2002. http://www.crn.com/news/security/18821726/microsofts-ceo-80-20-rule-applies-to-bugs-not-just-features.htm.

Rowlingson, A. Ten step process for forensic readiness. International Journal of Digital Evidence, vol. 2, no. 3, 2004.

Royal Canadian Mounted Police. Crime prevention through environmental design. Government of Canada, 2011. http://www.rcmp-grc.gc.ca/pubs/ccaps-spcca/safecomm-seccollect-eng.htm.

Ruan, Keyun, Carthy, Joe, Kechadi, Tahar, Crosbie, Mark. Cloud Forensics, Advances in Digital Forensics VII. Springer, 2011. https://link.springer.com/chapter/10.1007/978-3-642-24212-0_3.

Saitta, Paul, Larcom, Brenda, Eddington, Michael. TRIKE V.1 methodology document. 2005. http://www.octotrike.org/papers/Trike_v1_Methodology_Document-draft.pdf.

Salama, Usama. Smart forensics for the Internet of Things (IoT). SecurityIntelligence, 2017. https://securityintelligence.com/smart-forensics-for-the-internet-of-things-iot/.

Sangaiah, Arun Kumar, Thangavelu, Arunkumar, Sundaram, Venkatesan Meenakshi. Cognitive Computing for Big Data Systems Over IoT: Frameworks, Tools and Applications. Springer, 2017. https://www.springer.com/gp/book/9783319706870.

SANS. Developing a computer forensics team. 2001. http://www.sans.org/reading-room/whitepapers/incident/developing-computer-forensics-team-628.

SANS. Information Security policy templates. 2015. https://www.sans.org/security-resources/policies/.

Schmitt, Veronia, Jordaan, Jason. Establishing the validity of MD5 and SHA-1 hashing in digital forensic practice in light of recent research demonstrating cryptographic weaknesses in these algorithms. International Journal of Computer Applications, 2013. http://www.lex-informatica.org/2%20Ensuring%20the%20Legality%20of%20the%20Digital%20Forensics%20Process%20in%20South%20Africa.pdf.

Schniederjans, Marc J., Hamaker, Jamie L., Schniederjans, Ashlyn M. Information Technology Investment: Decision-Making Methodology. World Scientific Co. Pvt. Ltd., 2004. https://www.worldscientific.com/worldscibooks/10.1142/7433.

Scientific Working Group on Digital Evidence (SWGDE). Model standard operation procedures version 3.0, 2012. https://www.swgde.org/documents/Current+Documents/SWGDE+QAM+and+SOP+Manuals/2012-09-13+SWGDE+Model+SOP+for+Computer+Forensics+v3.

Security Awareness Program Special Interest Group PCI Security Standards Council. Information supplement: Best practices for implementing a security awareness program. PCI Security Standards Council, 2014. https://www.pcisecuritystandards.org/documents/PCI_DSS_V1.0_Best_Practices_for_Implementing_Security_Awareness_Program.pdf.

Selamat, Siti Rahayu, Yusof, Robiah, Sahib, Shahrin. Mapping process of digital forensic investigation framework. IJCSNS International Journal of Computer Science and Network Security, vol. 8, no. 10, 163–169, 2008.

Smith, Ashley. Mobile Device Management: What’s Legal, What’s Not? Tom’s IT Pro, 2016.

State of North Dakota. Requirements analysis. New York State Office for Technology, 2001. https://www.nd.gov/itd/files/services/pm/requirements-analysis-guidebook.pdf.

Stephenson, Peter. A Comprehensive Approach to Digital Incident Investigation. Elsevier, 2003. http://www.emich.edu/cerns/downloads/pstephen/Comprehensive-Approach-to-Digital-Investigation.pdf.

Stephenson, Peter. (ISC)2 Official Guide to the CCFP CBK. CRC Press, 2014. https://www.amazon.ca/Official-ISC-Guide-CCFP-CBK/dp/1482262479.

Sule, Dauda. Importance of forensic readiness. ISACA Journal, vol. 1, 2014. http://www.isaca.org/Journal/archives/2014/Volume-1/Pages/JOnline-Importance-of-Forensic-Readiness.aspx#11.

Tan, John. Forensic readiness. 2001. http://home.eng.iastate.edu/~guan/course/backup/CprE-592-YG-Fall-2002/paper/forensic_readiness.pdf.

Tech Target. Cloud computing. 2015. http://searchcloudcomputing.techtarget.com/definition/cloud-computing.

Techtarget. Cloud provider. 2015. http://searchcloudprovider.techtarget.com/definition/cloud-provider.

TechTarget. IT asset. 2008. http://whatis.techtarget.com/definition/IT-asset.

TechTarget. Principle of Least Privilege (POLP). 2015. http://searchsecurity.techtarget.com/definition/principle-of-least-privilege-POLP.

TechTarget. Total cost of ownership. 2015. http://searchdatacenter.techtarget.com/definition/TCO.

Thomson, Lucy L. Mobile devices: New challengers for admissibility of electronic devices. American Bar, 2013. https://www.americanbar.org/content/dam/aba/events/science_technology/mobiledevices_new_challenges_admissibility_of_electronic_device.authcheckdam.pdf.

Tipton, Harold F. (ISC)2 Official Guide to the ISSAP CBK. CRC Press, 2011a. https://www.crcpress.com/Official-ISC2-Guide-to-the-ISSAP-CBK/Corporate/p/book/9781466579002.

Tipton, Harold F. (ISC)2 Official Guide to the ISSMP CBK. CRC Press, 2011b. https://www.crcpress.com/Official-ISC2-Guide-to-the-CISSP-ISSMP-CBK/Steinberg/p/book/9781466578951.

Treasury Board of Canada. Guide to integrated risk management. Government of Canada, 2012. http://www.tbs-sct.gc.ca/tbs-sct/rm-gr/guides/girm-ggir02-eng.asp.

Treasury Board of Canada Secretariat. Guide to risk taxonomies. Government of Canada, 2011. http://www.tbs-sct.gc.ca/tbs-sct/rm-gr/guides/grt-gtr01-eng.asp.

Trenwith, Philip M., Venter, Hein S. Digital Forensic Readiness in the Cloud. Information Security for South Africa, 2013. https://www.researchgate.net/publication/261164697_Digital_forensic_readiness_in_the_cloud.

Tripathy, B.K., Anuradha, J. Internet of Things (IoT): Technologies, Applications, Challenges, and Solutions. CRC Press, 2017. https://www.crcpress.com/Internet-of-Things-IoT-Technologies-Applications-Challenges-and-Solutions/Tripathy-Anuradha/p/book/9781138035003.

U.S. Department of Justice. Electronic crime scene investigation: A guide to first responders. 2001. https://www.ncjrs.gov/pdffiles1/nij/187736.pdf.

United States District Court, Eastern District Court of Missouri, Eastern Division. United States of America v Joseph Schmidt, III. U.S. Government Publishing Office, 2009. http://www.gpo.gov/fdsys/pkg/USCOURTS-moed-4_09-cr-00265/pdf/USCOURTS-moed-4_09-cr-00265-0.pdf.

University of Cagliari, Department of Computer Science Cagliari, Italy, 2013.

University of Rochester. Mobile Device User Agreement. 2016.

U.S.-CERT. Computer Forensics. 2008. https://www.us-cert.gov/sites/default/files/publications/forensics.pdf.

van der Molen, Fred. Get Ready for Cloud Computing, 2nd ed. Van Haren, 2012. https://www.amazon.com/Ready-Cloud-Computing-Haren-Publishing/dp/9087536402.

Versprite. PASTA Abstract. 2013. http://versprite.com/docs/PASTA_Abstract.pdf.

Webopedia. Entity-relationship diagram. 2015. http://www.webopedia.com/TERM/E/entity_relationship_diagram.html.

Webopedia. Mandatory access control. 2015. http://www.webopedia.com/TERM/M/Mandatory_Access_Control.html.

Webopedia. Metadata. 2015. http://www.webopedia.com/TERM/M/metadata.html.

Webopedia. Role-Based Access Control (RBAC). 2015. http://www.webopedia.com/TERM/S/structured_data.html.

Webopedia. Structured data. 2015. http://www.webopedia.com/TERM/S/structured_data.html.

Webopedia. Unstructured data. 2015. http://www.webopedia.com/TERM/U/unstructured_data.html.

Wheeler. Evan. Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. Elsevier, 2011. https://www.amazon.ca/Security-Risk-Management-Building-Information/dp/1597496154.

Wilson, Mark, Hash, Joan. Special Publication 800-50: Building an Information Technology Security Awareness and Training Program. National Institute of Standards and Technology (NIST), 2003. http://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-50.pdf.

Yasinsac, A., Manzano, Y. Policies to Enhance Computer and Network Forensics. IEEE Workshop on Information Assurance and Security, 2001. https://www.researchgate.net/publication/255680113_Policies_to_Enhance_Computer_and_Network_Forensics.

Yusoff, Yunus, Ismail, Roslan, Hassan, Zainuddin. Common phases of computer forensics investigation models. International Journal of Computer Science & Information Technology (IJCSIT), vol. 3, no. 3, 2011. http://airccse.org/journal/jcsit/0611csit02.pdf.

Zeltser, Lenny. The many fields of digital forensics and incident response. SANS Digital Forensics and Incident Response. 2014. https://digital-forensics.sans.org/blog/2014/01/30/many-fields-of-dfir.

Zulkipli, Nurul Huda Nik, Alenezi, Ahmed, Wills, Gary B. IoT forensic: Bridging the challenges in digital forensic and the Internet of Things. 2nd International Conference on Internet of Things, Big Data and Security, 2017. https://www.researchgate.net/publication/316867894_IoT_Forensic_Bridging_the_Challenges_in_Digital_Forensic_and_the_Internet_of_Things.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.16.81.71