Malmö University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field
Aden Community Coll, Dept Comp Sci, Aden, Yemen; Univ Teknol Malaysia UTM, Sch Comp, Fac Engn, Skudai 81310, Malaysia.
Univ Teknol Malaysia UTM, Sch Comp, Fac Engn, Skudai 81310, Malaysia.
Xiamen Univ Malaysia, Sch Elect & Comp Engn, Informat & Commun Dept, Sepang 43900, Malaysia.
Community Coll Qatar, Sch Informat Technol, Dept Cybersecur & Networking, Doha, Qatar.ORCID iD: 0000-0001-7355-2314
Show others and affiliations
2020 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 8, p. 145018-145032Article in journal (Refereed) Published
Abstract [en]

For every contact that is made in a database, a digital trace will potentially be left and most of the database breaches are mostly aimed at defeating the major security goals (Confidentiality, Integrity, and Authenticity) of data that reside in the database. In order to prove/refute a fact during litigation, it is important to identify suitable investigation techniques that can be used to link a potential incident/suspect to the digital crime. As a result, this paper has proposed suitable steps of constructing and Integrated Incident Response Model (IIRM) that can be relied upon in the database forensic investigation field. While developing the IIRM, design science methodology has been adapted and the outcome of this study has shown significant and promising approaches that could be leveraged by digital forensic experts, legal practitioners and law enforcement agencies. This is owing to the fact, that IIRM construction has followed incident investigation principles that are stipulated in ISO guidelines.

Place, publisher, year, edition, pages
IEEE, 2020. Vol. 8, p. 145018-145032
Keywords [en]
Database security, database forensics investigation, database incident, pre-incident response, during-incident response, post-incident response
National Category
Law and Society
Identifiers
URN: urn:nbn:se:mau:diva-18290DOI: 10.1109/ACCESS.2020.3008696ISI: 000560328600001Scopus ID: 2-s2.0-85090275743OAI: oai:DiVA.org:mau-18290DiVA, id: diva2:1469575
Available from: 2020-09-22 Created: 2020-09-22 Last updated: 2024-09-17Bibliographically approved

Open Access in DiVA

fulltext(3474 kB)478 downloads
File information
File name FULLTEXT01.pdfFile size 3474 kBChecksum SHA-512
ad048e352e3dc82867f93628965ed43c918c9f9f7a3c4c38d0e0b9aa0f5a33082c2311ea89f1a96486d2cf55b42986884ac3eb1072095d65c63ffdb8a73f218b
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Kebande, Victor R.

Search in DiVA

By author/editor
Ikuesan, Richard AdeyemiKebande, Victor R.
By organisation
Department of Computer Science and Media Technology (DVMT)
In the same journal
IEEE Access
Law and Society

Search outside of DiVA

GoogleGoogle Scholar
Total: 478 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 329 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf