This paper focuses on the operations involved in the digital forensic process using the requirements engineering framework KAOS. The idea is to enforce the claim that a requirements engineering approach to digital forensics produces reusable patterns for future incidents. Our patterns here will be operation-focused, rather than requirement-focused, which is simpler because the operations can potentially be exhaustively enumerated and evaluated. Thus, for example, given the complexity of the Ceglia versus Zuckerberg Facebook case involving alleged document forgery, we can show that one of the benefits coming out of the modelling exercise was the set of operations needed. This will give an estimate for the future of what kind of capabilities and resources are needed for other complex document-forgery cases involving computers. It may also help to plan investigations and prioritise the use of resources more widely within the case workload of investigators.
|Publication status||Published - 8 Jul 2013|
|Event||Cyberpatterns 2013 - Abingdon, Oxfordshire|
Duration: 8 Jul 2013 → 9 Jul 2013
|Period||8/07/13 → 9/07/13|
- Digital Forensics
- Requirements Engineering