Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix Ch14 image #222

Merged
merged 1 commit into from
Apr 25, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 3 additions & 1 deletion manuscript/chapter14.txt
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@

C> By Evangelos Dragonas, PhD | [Github](https://github.com/theAtropos4n6) | [Twitter](https://twitter.com/theAtropos4n6) | [Website](https://atropos4n6.com/) | [Discord](https://discordapp.com/user/708004364068978720)

Last update: Dec-2023

## 1. Introduction

Internet of Things (IoT) devices are becoming increasingly common and are used in a wide range of applications, from smart homes to industrial control systems. Their interconnected nature and their widespread adoption are two of the reasons these appliances are inevitably associated with criminal activity. Typically, their involvement either stems from becoming the target of a cyberattack (e.g. [Mirai IoT botnet](https://blog.cloudflare.com/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis)) or playing the role of a "witness" to a crime (e.g. [smartwatch](https://www.bbc.com/news/technology-43629255)). Regardless, the digital investigation of such IoT products in pursuit of any evidentiary data they store is a process known as IoT Forensics. In particular, IoT Forensics involves the identification, collection/preservation, analysis/examination, and reporting/presentation of data originating from IoT devices to reconstruct events related to an incident or crime. This can include data from sensors, network logs, smartphones, cloud, and other sources.
Expand Down Expand Up @@ -58,7 +60,7 @@
Now that the reader has an understanding of the challenges associated with IoT Forensics, it is time to explore some of the skills required for conducting digital investigations of IoT products. As identified by Stoyanova et al., (2020) (See Fig. 1), IoT Forensics is divided into IoT device-level forensics, network forensics, and cloud forensics. One can be really proficient in one of these three disciplines and lack expertise in the other two, or any other possible combination may apply. A metaphor for an investigator in IoT forensics might be a [UFC](https://www.ufc.com/) fighter. Of course, this doesn't mean one should punch sensors and devices out of the way, nor grapple with the refrigerator. However, it implies that one needs develop and combine cross-disciplined investigative competencies to succeed in this field of digital forensics, similar to how a UFC fighter practices different fighting disciplines to enhance competitiveness. Each of the three categories, along with some of the skills that a practitioner needs to develop while diving into this field, are presented below:

{width: 50%}
![Components of the IoT Forensics - Stoyanova et al., 2020](resources/Ch14/Stoyanova.PNG)
![Components of the IoT Forensics - Stoyanova et al., 2020](resources/Ch14/Stoyanova.jpg)
Dismissed Show dismissed Hide dismissed
Dismissed Show dismissed Hide dismissed

{pagebreak}

Expand Down
Binary file added manuscript/resources/Ch14/Stoyanova.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed manuscript/resources/Ch14/Stoyanova.png
Binary file not shown.
Loading