Y. Pronin, PhD Student
National Technical University of Ukraine
"Igor Sikorsky Kyiv Polytechnic Institute"
37, Beresteyskyi ave., 03056, Kyiv, Ukraine
e-mail:
V. Zubok, Dr. Sc.
G.E. Pukhov Institute for Modeling in Energy Engineering
National Academy of Sciences of Ukraine
15 Oleh Mudrak str., Kyiv, 03164, Ukraine
e-mail:
Èlektron. model. 2025, 47(3)104-111
https://doi.org/10.15407/emodel.47.03.104
ABSTRACT
The current state of research at the intersection of cybersecurity and digital forensics is examined. Focus is placed on methods and models developed to ensure information security during the collection of digital evidence. The latest academic contributions regarding secure data acquisition methods, cryptographic validation, real-time and unstable data forensics, processing evidence stored in cloud technologies, and the Internet of Things, as well as challenges in countering forensics, are classified and assessed. The importance of standardization, harmonization of legal norms, and interdisciplinary cooperation to support the admissibility, reliability, and ethical handling of digital evidence is highlighted. Gaps in current research are identified, and future directions are proposed, including the use of artificial intelligence in collection methods, forensic preparedness strategies as a vital component of cybersecurity, and harmonized frameworks for processing evidence across jurisdictions.
KEYWORDS
cybersecurity, information security, digital forensics, digital evidence.
REFERENCES
- Belshaw, S., Nodeland, B. (2022). Digital evidence experts in the law enforcement community: understanding the use of forensics examiners by police agencies. Secur J 35, 248-262. https://doi.org/10.1057/s41284-020-00276-w
- Khakhanovskyi, V., & Hrebenkova, М. (2022). Identification, collection, and investigation of electronic imagery as sources of evidence. Law Journal of the National Academy of Internal Affairs, 12(4), 28-39. https://doi.org/10.56215/04221204.28
- Benancio, Lizbardo & Canales, Ricardo & Leon, Paolo & Huamani Uriarte, Enrique. (2021). Integrity and Authenticity of Digital Images by Digital Forensic Analysis of Metadata. International Journal of Emerging Technology and Advanced Engineering. 11. 38-45. https://doi.org/10.46338/ijetae0921_05
- Setiawan, Nova & Pratama, Ahmad & Ramadhani, Erika. (2022). Metode Live Forensik Untuk Investigasi Serangan Formjacking Pada Website Ecommerce. JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia). 7. 1-9
https://doi.org/10.32528/justindo. v7i1.5356 - Ritzkal, Hendrawan, A.H., Kurniawan, R., Aprian, A.J., Primasari, D., Subchan, M. (2024). Enhancing cybersecurity through live forensic investigation of Remote Access Trojan attacks using FTK Imager software. International Journal of Safety and Security Engineering, Vol. 14, No. 1, pp. 217-223
https://doi.org/10.18280/ijsse.140121 - Pathak, M., Mishra, K.N. & Singh, S.P. (2024). Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and developing effective safeguard. Artif Intell Rev 57, 269. https://doi.org/10.1007/s10462-024-10908-x
- Mishra, Alok & Alzoubi, Yehia & Anwar, Memoona, J. & Gill, Asif. (2022). Attributes impacting cybersecurity policy development: An evidence from seven nations. Computers & Security. 120. https://doi.org/10.1016/j.cose.2022.102820
- Allah Rakha, N. (2024). Cybercrime and the Law: Addressing the Challenges of Digital Forensics in Criminal Investigations. Mexican Law Review, 16(2), 23-54. https://doi.org/10.22201/iij.24485306e.2024.2.18892
- Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 (2016). General Data Protection Regulation (GDPR). Official Journal of the European Union. https://eur-lex.europa.eu/eli/reg/2016/679/oj
- Electronic Communications Privacy Act of 1986, 18 U.S.C. §§ 2510-2523 (1986). https://bja.ojp.gov/program/it/privacy-civil-liberties/authorities/statutes/1285
- International Organization for Standardization. (2022). ISO/IEC 27002:2022(en): Information security, cybersecurity and privacy protection — Information security controls. https://www.iso.org/obp/ui/ru/#iso:std:iso-iec:27002:ed-3:v2:en
- Hoelz, B., Maues, M. (2017). Anti-Forensic Threat Modeling. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XIII. DigitalForensics 2017. IFIP Advances in Information and Communication Technology, vol 511. Springer, Cham. https://doi.org/10.1007/978-3-319-67208-3_10