Methods and Models for Ensuring Information Security During the Collection of Digital Evidence

Y. Pronin, PhD Student
National Technical University of Ukraine
"Igor Sikorsky Kyiv Polytechnic Institute"
37, Beresteyskyi ave., 03056, Kyiv, Ukraine
e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.;
V. Zubok, Dr. Sc.
G.E. Pukhov Institute for Modeling in Energy Engineering
National Academy of Sciences of Ukraine
15 Oleh Mudrak str., Kyiv, 03164, Ukraine
e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.

Èlektron. model. 2025, 47(3)104-111

https://doi.org/10.15407/emodel.47.03.104

ABSTRACT

The current state of research at the intersection of cybersecurity and digital forensics is exa­mined. Focus is placed on methods and models developed to ensure information security du­ring the collection of digital evidence. The latest academic contributions regarding secure data acquisition methods, cryptographic validation, real-time and unstable data forensics, proces­sing evidence stored in cloud technologies, and the Internet of Things, as well as challenges in countering forensics, are classified and assessed. The importance of standardization, harmonization of legal norms, and interdisciplinary cooperation to support the admissibility, reliability, and ethical handling of digital evidence is highlighted. Gaps in current research are identified, and future directions are proposed, including the use of artificial intelligence in collection methods, forensic preparedness strategies as a vital component of cybersecurity, and harmoni­zed frameworks for processing evidence across jurisdictions.

KEYWORDS

cybersecurity, information security, digital forensics, digital evidence.

REFERENCES

  1. Belshaw, S., Nodeland, B. (2022). Digital evidence experts in the law enforcement community: understanding the use of forensics examiners by police agencies. Secur J 35, 248-262. https://doi.org/10.1057/s41284-020-00276-w
  2. Khakhanovskyi, V., & Hrebenkova, М. (2022). Identification, collection, and investigation of electronic imagery as sources of evidence. Law Journal of the National Academy of Internal Affairs, 12(4), 28-39. https://doi.org/10.56215/04221204.28
  3. Benancio, Lizbardo & Canales, Ricardo & Leon, Paolo & Huamani Uriarte, Enrique. (2021). Integrity and Authenticity of Digital Images by Digital Forensic Analysis of Metadata. International Journal of Emerging Technology and Advanced Engineering. 11. 38-45. https://doi.org/10.46338/ijetae0921_05
  4. Setiawan, Nova & Pratama, Ahmad & Ramadhani, Erika. (2022). Metode Live Forensik Untuk Investigasi Serangan Formjacking Pada Website Ecommerce. JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia). 7. 1-9
    https://doi.org/10.32528/justindo. v7i1.5356
  5. Ritzkal, Hendrawan, A.H., Kurniawan, R., Aprian, A.J., Primasari, D., Subchan, M. (2024). Enhancing cybersecurity through live forensic investigation of Remote Access Trojan attacks using FTK Imager software. International Journal of Safety and Security Enginee­ring, Vol. 14, No. 1, pp. 217-223
    https://doi.org/10.18280/ijsse.140121
  6. Pathak, M., Mishra, K.N. & Singh, S.P. (2024). Securing data and preserving privacy in cloud IoT-based technologies an analysis of assessing threats and developing effective safeguard. Artif Intell Rev 57, 269. https://doi.org/10.1007/s10462-024-10908-x
  7. Mishra, Alok & Alzoubi, Yehia & Anwar, Memoona, J. & Gill, Asif. (2022). Attributes impacting cybersecurity policy development: An evidence from seven nations. Computers & Security. 120. https://doi.org/10.1016/j.cose.2022.102820
  8. Allah Rakha, N. (2024). Cybercrime and the Law: Addressing the Challenges of Digital Forensics in Criminal Investigations. Mexican Law Review, 16(2), 23-54. https://doi.org/10.22201/iij.24485306e.2024.2.18892
  9. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 (2016). General Data Protection Regulation (GDPR). Official Journal of the European Union. https://eur-lex.europa.eu/eli/reg/2016/679/oj
  10. Electronic Communications Privacy Act of 1986, 18 U.S.C. §§ 2510-2523 (1986). https://bja.ojp.gov/program/it/privacy-civil-liberties/authorities/statutes/1285
  11. International Organization for Standardization. (2022). ISO/IEC 27002:2022(en): Information security, cybersecurity and privacy protection — Information security controls. https://www.iso.org/obp/ui/ru/#iso:std:iso-iec:27002:ed-3:v2:en
  12. Hoelz, B., Maues, M. (2017). Anti-Forensic Threat Modeling. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics XIII. DigitalForensics 2017. IFIP Advances in Information and Communication Technology, vol 511. Springer, Cham. https://doi.org/10.1007/978-3-319-67208-3_10

Full text: PDF