From 0edfc93d0caf8f8227a1db03fcd565b55ee28c39 Mon Sep 17 00:00:00 2001 From: "theAtropos4n6 (Evangelos D.)" <70748441+theAtropos4n6@users.noreply.github.com> Date: Mon, 22 Apr 2024 22:35:41 +0300 Subject: [PATCH 1/2] Update authors.txt --- manuscript/authors.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/manuscript/authors.txt b/manuscript/authors.txt index 526f106..0f4d98b 100644 --- a/manuscript/authors.txt +++ b/manuscript/authors.txt @@ -68,4 +68,4 @@ Mark Berger is a data recovery professional, author and trainer which also holds ### Evangelos Dragonas -Evangelos Dragonas is currently a postdoctoral researcher at the University of Piraeus, Greece. His research focuses on applied Digital Forensics. He also works as a full-time Digital Forensic Examiner and holds CFCE, MCFE, and MCME certifications. Evangelos shares his findings at conferences, through research articles, on his blog, and by contributing to FOSS. +Evangelos Dragonas is currently a postdoctoral researcher at the University of Piraeus, Greece. His research focuses on applied Digital Forensics. He also works as a full-time Digital Forensic Examiner and holds CFCE, MCFE, MCCE and MCME certifications. Evangelos shares his findings at conferences, through research articles, on his blog, and by contributing to FOSS. From 1d72fba270c0cdef0ab275da8d5bec5b23e656cc Mon Sep 17 00:00:00 2001 From: "theAtropos4n6 (Evangelos D.)" <70748441+theAtropos4n6@users.noreply.github.com> Date: Mon, 22 Apr 2024 22:38:38 +0300 Subject: [PATCH 2/2] Update chapter14.txt (#219) --- manuscript/chapter14.txt | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/manuscript/chapter14.txt b/manuscript/chapter14.txt index bbeed1a..8863b48 100644 --- a/manuscript/chapter14.txt +++ b/manuscript/chapter14.txt @@ -67,7 +67,7 @@ There are more than 20 studies (Alabdulsalam, et al., 2018), (Alenezi, et al., 2 Now that the reader has an understanding of the challenges associated with IoT Forensics, it is time to explore some of the skills required for conducting digital investigations of IoT products. As identified by Stoyanova et al., (2020) (See Fig. 1), IoT Forensics is divided into IoT device-level forensics, network forensics, and cloud forensics. One can be really proficient in one of these three disciplines and lack expertise in the other two, or any other possible combination may apply. A metaphor for an investigator in IoT forensics might be a [UFC](https://www.ufc.com/) fighter. Of course, this doesn't mean one should punch sensors and devices out of the way, nor grapple with the refrigerator. However, it implies that one needs develop and combine cross-disciplined investigative competencies to succeed in this field of digital forensics, similar to how a UFC fighter practices different fighting disciplines to enhance competitiveness. Each of the three categories, along with some of the skills that a practitioner needs to develop while diving into this field, are presented below: {width: 50%} -![Components of the IoT Forensics - Stoyanova et al., 2020](resources/Ch14/Stoyanova.PNG) +![Components of the IoT Forensics - Stoyanova et al., 2020](resources/Ch14/Stoyanova.png) {pagebreak} @@ -241,4 +241,4 @@ S. Zawoad and R. Hasan, "FAIoT: Towards Building a Forensics Aware Eco System fo N. Zulkipli, A. Alenezi and G. B. Wills, "IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things:," in Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, Porto, 2017. doi: 10.5220/0006308703150324. -* * * \ No newline at end of file +* * *