Browse > Article
http://dx.doi.org/10.12673/jant.2011.15.6.1212

Study on Digital Investigation Model for Privacy Acts in Korea  

Lee, Chang-Hoon (School of Computer Engineering, Hanshin University)
Abstract
As recently Privacy Acts in Korea enforced in domestic companies' personal information management needs of a growing obligation for the safety measures and the right of personal information collection, use, limitations, management, and destroyed specifically for handling personal information. Such this regulations should be required technical and policy supports. Accordingly, for the enterprise incident has occurred, the personal information management system behave correctly operating to verify that the safety measures taken, and be determined by the specific preparation to be done. So the first, preparation phase corresponds to the upcoming digital forensic investigation model. On the other hand, the response team also carried these measures out correctly, it needs to be done to check the compliance of Privacy Act. Thus a digital forensics investigation model is strictly related with the implementation of the Privacy Acts and improve the coping strategies are needed. In this paper, we suggest a digital forensic investigation model corresponding to Privacy Act.
Keywords
Digital Forensic; Digital Investigation Model; Privacy Act; Forensic Readiness;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Sundresan Perumal, Digital Forensic Model Based On Malaysian Investigation Process, International Journal of Computer Science and Network
2 Ricci S.C. Ieong, FORZA - Digital forensics investigation framework that incorporate legal issues, Digital Investigation, Volume 3, Supplement 1, The Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS '06), 2006
3 Seeamus O CiardhuAain, An Extended Model of Cybercrime Investigations, International Journal of Digital Evidence, Volume 3, Issue 1, 2004
4 Mark Reith, Clint Carr, Gregg Gunsch, An Examination of Digital Forensic Models, International Journal of Digital Evidence, Volume 1, Issue 3, 2002
5 DFRWS TECHNICAL REPORT-A Road Map for Digital Forensic Research, 2001
6 Eoghan Cesay, Digital Evidence And Computer Crime-Forensic Science Computers And The Internet 2nd edtion, Elsevier, 2004
7 Warren G Kruse, Jay Heiser, Computer Forensics: Incident Response Essentials, Addison-Wesley Professional, 2001
8 Timothy Palmbach, Marilyn Miller, Henry Lee, Henry Lee's Crime Scene Handbook. San Diego, Academic Press, 2001
9 S. von Solms, C. Louwrens, C. Reekie and T. Grobler, A Control Framework for Digital Fornesics, Advances in Digital Forensics II. IFIP Advances in Information and Communication Technology, 2006, pp.343-355
10 Georgios Pangalos and Vasilios Katos, Information Assurance and Forensic Readiness, Computer Science Next Generation Society. Technological and Legal Issues, LNCS, Social Informatics and Telecommunications Engineering, 2010, Volume 26, Part 6
11 T. Grobler, and B. Louwrens, "Digital forensic readiness as a component of information security best practice", in IFIP International Federation for Information Processing, Vol. 232, New Approaches for Security, Privacy and Trust in Complex Environments, Springer, 2007, pp. 13-24
12 Pangalos G. Ilioudis, C. Pagkalos, I. The Importance of Corporate Forensic Readiness in the Information Security Framework, 2010 19th IEEE International Workshop on Infrastructures for Collaborative Enterprises (WETICE), June 2010, pp. 12-16
13 Cabinet Office of United Kingdom, HMG Security Policy Framework ver6.0, May 2011
14 개인정보보호법, 제정 2011.3.29 법률 제10465호
15 이창훈, 임경수, "국내 환경을 고려한 디지털 포렌식 조사 모델 정립 방안," 한국정보처리학회 추계학술발표대회 논문집 제18권, 제2호, 2011.11
16 경찰청, 디지털 포렌식 증거 처리 가이드라인, 2008
17 대검찰청, 디지털증거압수수색모델, 2009