Digital forensic investigation readiness enables an organisation to prepare itself in order to perform a digital forensic investigation in a more efficient and effective manner. Benefits of achieving a high level of digital forensic investigation readiness include, but are not limited to, higher admissibility of digital evidence in a court of law, better utilisation of resources (including time and financial resources) and higher awareness of forensic investigation readiness. The problem that this paper addresses is that there is no harmonised digital forensic investigation readiness process model with appropriate implementation guidelines and, thus, there is a lack of an effective and standardised implementation of digital forensic investigation readiness measures within organisations. Valjarevic and Venter have, in their previous work, proposed a harmonised digital forensic investigation readiness process model. This paper proposes implementation guidelines for such a harmonised digital forensic investigation process model in order to help practitioners and researchers to successfully implement the proposed model. The authors believe that these guidelines will significantly help to properly and consistently implement digital forensic readiness measures in different organisations in a bid to achieve higher admissibility of digital evidence in a court of law, as well as more efficient and effective digital forensic investigations.
[1]
Hein S. Venter,et al.
Harmonised digital forensic investigation process model
,
2012,
2012 Information Security for South Africa.
[2]
Eugene H. Spafford,et al.
An Event-Based Digital Forensic Investigation Framework
,
2004
.
[3]
Nicole Beebe,et al.
A hierarchical, objectives-based framework for the digital investigations process
,
2005,
Digit. Investig..
[4]
Eugene H. Spafford,et al.
Getting Physical with the Digital Investigation Process
,
2003,
Int. J. Digit. EVid..
[5]
Kevin Mandia,et al.
Incident Response & Computer Forensics
,
2003
.
[6]
Alec Yasinsac,et al.
Policies to Enhance Computer and Network Forensics
,
2001
.
[7]
Kevin Mandia,et al.
Incident Response & Computer Forensics, 2nd Ed.
,
2003
.
[8]
Jeni Wolfe-Wilson.
Management strategies for implementing forensic security measures
,
2003,
Inf. Secur. Tech. Rep..
[9]
Robert Rowlingson,et al.
A Ten Step Process for Forensic Readiness
,
2004,
Int. J. Digit. EVid..