
Research Article
Intersection of Electronic Security and Digital Forensics: Data Protecting Techniques and Uncovering Data Clues
@INPROCEEDINGS{10.1007/978-3-031-81570-6_23, author={Norman Nelufule and Boitumelo Nkwe and Daniel Shadung and Kele Masemola and Tanita Singano and Japhtalina Mokoena and Zamo Ngubane and Ntombizodwa Thwala}, title={Intersection of Electronic Security and Digital Forensics: Data Protecting Techniques and Uncovering Data Clues}, proceedings={Towards new e-Infrastructure and e-Services for Developing Countries. 15th International Conference, AFRICOMM 2023, Bobo-Dioulasso, Burkina Faso, November 23--25, 2023, Proceedings, Part I}, proceedings_a={AFRICOMM}, year={2025}, month={2}, keywords={Digital Forensics Digital Evidence Data Protection Electronic Security}, doi={10.1007/978-3-031-81570-6_23} }
- Norman Nelufule
Boitumelo Nkwe
Daniel Shadung
Kele Masemola
Tanita Singano
Japhtalina Mokoena
Zamo Ngubane
Ntombizodwa Thwala
Year: 2025
Intersection of Electronic Security and Digital Forensics: Data Protecting Techniques and Uncovering Data Clues
AFRICOMM
Springer
DOI: 10.1007/978-3-031-81570-6_23
Abstract
With the current era of technology, protecting data and infrastructure has become more of a concern as sensitive information is being stored on Digital platforms. The various new technologies being developed make it harder to secure electronic data as malicious actors keep utilizing the latest tips and tools to perform attacks. These latest technologies also display gaps within digital forensics as there are not a lot of tools that can assist in the investigation of cyber incidents and properly preserve digital evidence after an incident has been detected. For example, as more individuals and organizations migrate their data and infrastructure to cloud platforms, new skills and forensic tools are required to extract evidence from the cloud. This study presents various electronic security measures and case studies of security breaches where the use of Digital Forensics assisted with the investigation and the subsequent results assisted the organization affected or educated other institutions to be aware of techniques used by malicious actors. Keeping abreast with the latest tools and techniques will ensure that effective security measures are implemented to prevent security breaches. The continuous adaptation in technologies will assist in ensuring that investigators are able to perform forensically sound.