**Author details**

Amr Adel1 \* and Brian Cusack<sup>2</sup>

1 Whitecliffe College of Technology and Innovation, Auckland, New Zealand

2 AUT University, Auckland, New Zealand

\*Address all correspondence to: amra@whitecliffe.ac.nz

© 2020 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**87**

2016:1-6

2014;**9**:173

*The Role of Penetration Testing in Forensic Multimedia Retrieval Process*

[9] Shrivastava G, Kumar P, Gupta BB, Bala S, Dey N, editors. Handbook of Research on Network Forensics and Analysis Techniques. IGI Global; 2018

industrial control systems. International

[11] Cherdantseva Y, Burnap P, Blyth A, Eden P, Jones K, Soulsby H, et al. A review of cyber security risk assessment

[10] Genge B, Graur F, Haller P. Experimental assessment of network design approaches for protecting

Journal of Critical Infrastructure

methods for SCADA systems. Computers & security. 2016;**56**:1-27

[12] Stouffer K, Falco J, Scarfone K. Guide to industrial control systems (ICS) security. National Institute of Standards and Technology. 2008

[13] LeSaint J, Reed M, Popick P. System security engineering vulnerability assessments for mission-critical systems and functions. In: Proceedings of the Annual IEEE Systems Conference (SysCon). 13 Apr 2005. pp. 608-613

[14] Obregon L. Secure architecture for industrial control systems. SANS Institute InfoSec Reading Room. 2015

[16] Lutui R. A multidisciplinary digital forensic investigation process model. Business Horizons. 2016;**59**(6):593-604

diagnosing your system without killing it first. Communications of the ACM.

[17] Adelstein F. Live forensics:

2006;**49**(2):63-66

[15] D'Orazio CJ, Choo KK. Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps. Future Generation Computer Systems. 2018;**79**:247-261

Sep.

Protection. 2015;**11**:24-38

*DOI: http://dx.doi.org/10.5772/intechopen.94934*

[1] Phillips DM, Mazzuchi TA, Sarkani S. An architecture, system engineering, and acquisition approach for space system software resiliency. Information and Software Technology.

[2] Khader M, Hadi A, Al-Naymat G. HDFS file operation fingerprints for forensic investigations. Digital Investigation. 2018;**24**:50-61

[3] Choure C, Patil LH. A Literature Survey on Intrusion Detection and Protection System using Data Mining. International Journal of Advance Research, Ideas and Innovations in

[4] Regulation P. Regulation (EU) 2016/679 of the European Parliament and of the Council. REGULATION

[5] Qiu S, Liu J, Shi Y, Li M, Wang W. Identity-based private matching over outsourced encrypted datasets. IEEE Transactions on cloud Computing.

[6] Ahmad I, Abbas H, Raza A, Choo KK, Sajid A, Pasha M, Khan FA. Electronic crime investigations in a virtualised environment: a forensic process and prototype for evidence collection and analysis. Australian Journal of Forensic Sciences. 2018;4;50(2):183-208.

[7] Mouhtaropoulos A, Li CT,

Grobler M. Digital forensic readiness: are we there yet. Journal International Computers, Law & Technology.

[8] Jones J, Etzkorn L. Analysis of digital forensics live system acquisition methods to achieve optimal evidence preservation. IEEE SoutheastCon.

2018;**94**:150-164

**References**

Technology 2018;4:1.

(EU). 2016;p.679.

2015;23;6(3):747-59.

*The Role of Penetration Testing in Forensic Multimedia Retrieval Process DOI: http://dx.doi.org/10.5772/intechopen.94934*
