@article{Akotoye2020,title = {A study on problems of behaviour-based user attribution in computer forensic investigation},journal = {European Conference on Information Warfare and Security, ECCWS},year = {2020},volume = {2020-June},pages = {458-465},author = {Akotoye, F.X.K. and Adeyemi, R.I. and Venter, H.S.}}
2020
A Conceptual Model for Consent Management in South African e-Health Systems for Privacy Preservation
@inproceedings{Mlotshwa_2020, doi = {10.1145/3415088.3415097}, url = {https://doi.org/10.1145%2F3415088.3415097}, year = 2020, month = {sep}, publisher = {{ACM}}, author = {Likhwa Lothar Mlotshwa and Sheunesu M. Makura and Nickson M. Karie and Victor R. Kebande}, title = {Opportunistic security architecture for osmotic computing paradigm in dynamic {IoT}-Edge{\textquotesingle}s resource diffusion}, booktitle = {Proceedings of the 2nd International Conference on Intelligent and Innovative Computing Applications}}
2019
Digital Forensic Readiness Framework for Ransomware Investigation
@InProceedings{10.1007/978-3-030-05487-8_5,
author="Singh, Avinash
and Ikuesan, Adeyemi R.
and Venter, Hein S.",
editor="Breitinger, Frank
and Baggili, Ibrahim ",
title="Digital Forensic Readiness Framework for Ransomware Investigation",
booktitle="Digital Forensics and Cyber Crime",
year="2019",
publisher="Springer International Publishing",
address="Cham",
pages="91--105",
abstract="Over the years there has been a significant increase in the exploitation of the security vulnerabilities of Windows operating systems, the most severe threat being malicious software (malware). Ransomware, a variant of malware which encrypts files and retains the decryption key for ransom, has recently proven to become a global digital epidemic. The current method of mitigation and propagation of malware and its variants, such as anti-viruses, have proven ineffective against most Ransomware attacks. Theoretically, Ransomware retains footprints of the attack process in the Windows Registry and the volatile memory of the infected machine. Digital Forensic Readiness (DFR) processes provide mechanisms for the pro-active collection of digital footprints. This study proposed the integration of DFR mechanisms as a process to mitigate Ransomware attacks. A detailed process model of the proposed DFR mechanism was evaluated in compliance with the ISO/IEC 27043 standard. The evaluation revealed that the proposed mechanism has the potential to harness system information prior to, and during a Ransomware attack. This information can then be used to potentially decrypt the encrypted machine. The implementation of the proposed mechanism can potentially be a major breakthrough in mitigating this global digital endemic that has plagued various organizations. Furthermore, the implementation of the DFR mechanism implies that useful decryption processes can be performed to prevent ransom payment.",
isbn="978-3-030-05487-8"
}
2019
CFRaaS: Architectural design of a Cloud Forensic Readiness as-a-Service Model using NMB solution as a forensic agent
@article{Kebande_2019,
doi = {10.1080/20421338.2019.1585675},
url = {https://doi.org/10.1080%2F20421338.2019.1585675},
year = 2019,
month = {apr},
publisher = {Informa {UK} Limited},
pages = {1--21},
author = {Victor R. Kebande and H. S. Venter},
title = {{CFRaaS}: Architectural design of a Cloud Forensic Readiness as-a-Service Model using {NMB} solution as a forensic agent},
journal = {African Journal of Science, Technology, Innovation and Development}
}