The Analysis of Top Cyber Investigation Trends

The Analysis of Top Cyber Investigation Trends

Alicia Leslie-Jones
DOI: 10.4018/978-1-7998-6504-9.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cybersecurity is an ever-evolving area of technology. As such, there will always be myriad trends to consider. Through the progression of cybersecurity comes the increased need for organizations to keep pace with the rapid development of technology. However, the current skills gap of cybersecurity professionals has overwhelmingly become a cause for concern. The spread of cloud computing has created a need for new cloud forensics procedures, and the use of internet-connected medical devices has added concerns for the information security structure of many organizations. In order to resolve these issues, proper vulnerability testing and implementation of new processes to keep up with the changes in technology have to be introduced to reduce the possibility of hacking incidents and aid in remediation. If more organizations leverage the skills and personnel available to them, there are ways to reduce the skills gap and other issues affecting cybersecurity.
Chapter Preview
Top

Combating Cybersecurity And Investigation Shortfalls

This chapter will outline three of the top trending cybersecurity and investigation issues and the ways in which these issues should be further investigated and remediated to prevent further shortfalls. If these issues remain unresolved and unmitigated, cybersecurity will become less of a preventative measure for many organizations and explicitly become a reactionary force. As hacking becomes more prevalent in all areas of the technology-filled lifestyle to which this world has grown accustomed, more must be done to lessen its effect on people, businesses, and other entities. As helpful as technology has become, it also has the ability to bring about the demise of those organizations that do not do their part to effectively safeguard against cyberattacks and secure the data stored within their systems. The proper handling of cybersecurity cannot solely be done through the use of technology-based tools. The use of human interaction will always be necessary for the monitoring, testing and the implementation of cybersecurity best practices.

Key Terms in this Chapter

Digital forensics: The process of recovering and investigating the data stored on digital devices such as computers and mobile phones.

Gender Wage Gap: The difference in earnings between men and women. This amount varies by education and other demographics.

Firewall: Hardware or software solutions used to prevent unauthorized access to private networks through the internet.

Multi-Tenancy: Architecture and software that is hosted to serve multiple organizations using the same pool of resources.

Cross-Border Law: Laws that enable investigations to be conducted in different jurisdictions with the help of other governments.

Intrusion Detection System: A device or software solution that monitors networks and systems for malicious activity.

Cloud Investigation Framework: A collection of standards and processes to aid in the performance of cloud forensic investigations.

Cloud Service Provider: A company or organization who provides cloud-based products and infrastructure.

Junk Science: Scientific information deemed faulty or biased to provide intentional results.

Virtual Machine: A computer instance that uses software instead of hardware to run programs and applications.

Complete Chapter List

Search this Book:
Reset