Investigating and Implementing an Email Forensic Readiness Architecture

Show simple item record

dc.contributor.advisor Venter, Hein S.
dc.contributor.postgraduate Van Staden, F.R.
dc.date.accessioned 2018-08-17T09:42:50Z
dc.date.available 2018-08-17T09:42:50Z
dc.date.created 2005/02/18
dc.date.issued 2017
dc.description Dissertation (MSc)--University of Pretoria, 2017.
dc.description.abstract Email forensic investigations rely on the collection and analysis of digital forensic evidence collected from email systems. Problems arise when the digital forensic evidence needed for the email forensic investigation is no longer available or there is a huge amount of email data that can be collected which take time to sift through to find the digital forensic evidence that is actually needed. The email digital forensic readiness (eDFR) architecture, as proposed in this dissertation, endeavours to address these problems. The eDFR architecture is based on the digital forensic readiness process described in ISO 27043. To ensure that the collected email data can be used as digital forensic evidence a process to validate the collected email data was created. The validation process uses data collected from the email IP headers to validate the data in the SMTP headers ensuring that the SMTP header data was not spoofed or in any way changed. The IP header data is stored in an audit database together with the email data so that the validation process can be executed at any time. An audit database is used to store the collected data to ensure that once the data is stored it cannot be tampered with. The digital forensic evidence collected using the eDFR architecture was found to be useable as part of an email forensic investigation. It was also found to be useful for other processes such as creating a graph representation of email sent and received by an email system or a group of email systems. It was shown that implementing the eDFR architecture could be achieved in an economical way that has almost no impact on current email systems.
dc.description.availability Unrestricted
dc.description.degree MSc
dc.description.department Computer Science
dc.identifier.citation Van Staden, FR 2017, Tracing the origin of unsolicited electronic communication using digital forensics, MSc Dissertation, University of Pretoria, Pretoria, viewed yymmdd <http://hdl.handle.net/2263/66254>
dc.identifier.other A2018
dc.identifier.uri http://hdl.handle.net/2263/66254
dc.language.iso en
dc.publisher University of Pretoria
dc.rights © 2018 University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria.
dc.subject UCTD
dc.title Investigating and Implementing an Email Forensic Readiness Architecture
dc.type Dissertation


Files in this item

This item appears in the following Collection(s)

Show simple item record