Digital Forensics of IoT Devices Homework
Digital Forensics of IoT Devices Homework
Purpose: The purpose of this Digital Forensics homework assignment is to investigate the security issues
with IoT Devices. Parts 3 – 6 should take at least two whole pages to answer and have citations.
Part 1: Read & watch the following two sources:
Petnet https://www.amazon.com/dp/B07HPYQBTS
SmartFeeder
ecocirc® XL http://bellgossett.com/pumps-
Heating & circulators/circulator-pumps/heating-cooling-
Cooling circulators/ecocirc-xl-high-efficiency-large-ecm-
Circulator heating/
US Army https://www.army.mil/article/188088?a
Situational
Awareness AR
information.
According to Rodney McKemmish, author of Advances in Digital Forensics IV, copies of digital
information are forensically sound if the data can be collected without any changes to the
data or metadata. Forensically sound copies are often made through drive imaging, a
to be forensically sound, the drive imaging process must satisfy the following
requirements- the process must produce an exact copy of the original, the duplicated data
must independently authenticate as being a true copy, and the process must produce an
audit trail. This audit trail serves as a chain of custody, to keep track of every step that
was taken in collecting the evidence. This assists in ensuring the data collection process
Part 4: What are proactive measures that one can take with IoT Digital Forensic solutions can be
acted upon?
Proactive forensic approaches can be described as approaches that can deal with digitally
enhance an origination’s readiness for incident response. There are three phases of
proactive measures that can be taken with IoT digital forensics- proactive collection,
relation to a suspicious event. Finally, Proactive analysis is the automated live analysis of
evidence. This analysis can use forensics techniques such as data mining to create the
initial hypothesis of an incident report. This forensic proactivity can result in lower
Part 5: How does the standardization of ISO/IEC 27043:2015, titled “Information technology -
According to iso.org, “ISO/IEC 27043:2015 provides guidelines based on idealized models for
involving digital evidence.” In essence, this standard describes general overviews for
incident investigation. This is influential because it means that processes no longer have
to cater to particular details within each specific investigation, and can instead provide a
Part 6: Over the next five years, what should be done with IoT to create a more secure
environment?
Broadly speaking, all IoT device manufacturers should employ increased security measures. No
matter how insignificant and harmless the product may seem, any device part of a IoT has the
potential to be hacked and cause damage to a company or individual, just like the Kayla
interactive doll in the TED talk video. The security should not stop at just the device, however.
The network and cloud should be secured as well in order to ensure maximum security for data
within any given IoT. Additionally, the ability for an IoT to be able to recognize possible
- Encryption of information
23141-4_9
response-7-benefits-/a/d-id/1324363
Zapproved. (2020, February 26). What Is Forensically Sound Data Collection? Retrieved from
https://zapproved.com/blog/what-is-forensically-sound-data-collection/