Digital forensics investigative framework for control rooms in critical infrastructure

Brian Cusack, Amr Mahmoud

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

In this paper a cyber-forensic framework with a detailed guideline for protecting control systems is developed to improve the forensic capability for big data in critical infrastructures. The main objective of creating a cyber-forensic plan is to cover the essentials of monitoring, troubleshooting, data reconstruction, recovery, and the safety of classified information. The problem to be addressed in control rooms is the diversity and quantity of data, and for investigators, bringing together the different skill groups for managing data and device diversity. This research embraces establishing of a new digital forensic model for critical infrastructures that supports digital forensic investigators with the necessary information for conducting an advanced forensic investigation in Critical Infrastructures. The framework for investigation is presented here and elaborated. The extended work applies the framework to industry case studies and is not reported here.

Original languageEnglish
Title of host publicationAustralian Digital Forensics Conference, ADF 2018
EditorsCraig Valli
PublisherSRI Security Research Institute, Edith Cowan University
Pages17-23
Number of pages7
ISBN (Electronic)9780648444404
DOIs
Publication statusPublished - 2018
Event16th Australian Digital Forensics Conference, ADF 2018 - Perth, Australia
Duration: 4 Dec 2018 → …

Publication series

NameAustralian Digital Forensics Conference, ADF 2018

Conference

Conference16th Australian Digital Forensics Conference, ADF 2018
Country/TerritoryAustralia
CityPerth
Period4/12/18 → …

Keywords

  • Control Room
  • Critical Infrastructure
  • Digital Forensics
  • Investigation

Fingerprint

Dive into the research topics of 'Digital forensics investigative framework for control rooms in critical infrastructure'. Together they form a unique fingerprint.

Cite this