Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks

B. Fakiha
{"title":"Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks","authors":"B. Fakiha","doi":"10.58346/jowua.2024.i1.008","DOIUrl":null,"url":null,"abstract":"As critical infrastructure networks become more interconnected and digitalized, they confront increased cyber threats fueled by the growing adoption of digitalized working and general operation methods around the world. This research delves into the complex topic of critical infrastructure network security by examining the hidden challenges and best forensic techniques used to safeguard these crucial systems. The study utilizes a comprehensive data collection approach that integrates an experiment and a case study to provide an in-depth understanding of this essential subject. It assesses the efficacy of various digital forensic procedures customized for critical infrastructure network protection by using meticulously designed experiments within controlled simulated environments. The findings highlight the wide range of challenges and threats that organizations tasked with maintaining and securing these networks encounter. The case study illuminates how forensic practices can be used in incident response and recovery situations. The results highlight the significance of a diversified approach to safeguarding critical infrastructure networks. They emphasize the need for modern methods and practices, such as blockchain technology and Artificial intelligence, by analyzing findings from the experiment and the case study.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"6 5","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58346/jowua.2024.i1.008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

As critical infrastructure networks become more interconnected and digitalized, they confront increased cyber threats fueled by the growing adoption of digitalized working and general operation methods around the world. This research delves into the complex topic of critical infrastructure network security by examining the hidden challenges and best forensic techniques used to safeguard these crucial systems. The study utilizes a comprehensive data collection approach that integrates an experiment and a case study to provide an in-depth understanding of this essential subject. It assesses the efficacy of various digital forensic procedures customized for critical infrastructure network protection by using meticulously designed experiments within controlled simulated environments. The findings highlight the wide range of challenges and threats that organizations tasked with maintaining and securing these networks encounter. The case study illuminates how forensic practices can be used in incident response and recovery situations. The results highlight the significance of a diversified approach to safeguarding critical infrastructure networks. They emphasize the need for modern methods and practices, such as blockchain technology and Artificial intelligence, by analyzing findings from the experiment and the case study.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
调查关键基础设施网络安全的秘密、新挑战和最佳取证方法
随着关键基础设施网络的互联化和数字化程度越来越高,它们所面临的网络威胁也越来越大,而全球各地越来越多地采用数字化工作和一般操作方法,更是助长了这种威胁。本研究深入探讨了关键基础设施网络安全这一复杂课题,研究了用于保护这些关键系统的隐藏挑战和最佳取证技术。本研究采用了一种综合数据收集方法,将实验和案例研究相结合,以深入了解这一重要课题。它通过在受控模拟环境中使用精心设计的实验,评估了为关键基础设施网络保护定制的各种数字取证程序的功效。研究结果凸显了负责维护和保护这些网络的组织所遇到的各种挑战和威胁。案例研究阐明了如何在事件响应和恢复情况下使用取证实践。研究结果强调了采用多样化方法保护关键基础设施网络的重要性。通过分析实验和案例研究的结果,他们强调了现代方法和实践的必要性,如区块链技术和人工智能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
4.40
自引率
0.00%
发文量
0
期刊介绍: JoWUA is an online peer-reviewed journal and aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to wireless mobile networks, ubiquitous computing, and their dependable applications. JoWUA consists of high-quality technical manuscripts on advances in the state-of-the-art of wireless mobile networks, ubiquitous computing, and their dependable applications; both theoretical approaches and practical approaches are encouraged to submit. All published articles in JoWUA are freely accessible in this website because it is an open access journal. JoWUA has four issues (March, June, September, December) per year with special issues covering specific research areas by guest editors.
期刊最新文献
Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications Performance Evaluation of Collision Avoidance for Multi-node LoRa Networks based on TDMA and CSMA Algorithm Human-Centric AI : Enhancing User Experience through Natural Language Interfaces A Study on the Implementation of a Network Function for Real-time False Base Station Detection for the Next Generation Mobile Communication Environment Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1