This lecture, from course CIS8708-Digital Forensics (Guide to Computer Forensics and Investigations), discusses the role of blockchain technologies in digital forensics investigation
Non-fungible tokens (NFTs) are unique digital assets that are verified on a blockchain network, allowing for the creation and ownership of one-of-a-kind digital items, such as artwork, music, videos, and other types of digital content. They are important because they provide a way for digital creators to monetize their work and establish ownership, scarcity, and authenticity of their creations. NFTs have also gained popularity as a form of investment and collectible item, with some NFTs selling for millions of dollars.
This slide deck includes the following sections:
Introduction: Provide a brief overview of what NFTs are and their significance in the digital world.
How NFTs work: Explain the process of creating and verifying NFTs on a blockchain network, including the use of smart contracts and cryptographic hashing.
Types of NFTs: Describe the various types of NFTs that can be created, such as digital artwork, music, videos, and other types of digital content.
Benefits of NFTs: Highlight the benefits of NFTs, including the ability to establish ownership, scarcity, and authenticity of digital assets, as well as their potential as a new source of revenue for creators.
Market trends: Provide an overview of the current state of the NFT market, including recent sales and trends in various industries, such as art, sports, and gaming.
Potential use cases: Discuss potential use cases for NFTs beyond the current market, such as in the areas of identity verification, supply chain management, and digital voting.
Challenges and risks: Acknowledge the challenges and risks associated with NFTs, such as environmental concerns related to blockchain networks and the potential for fraudulent activity.
Conclusion: Summarize the key takeaways of the presentation and emphasize the growing importance of NFTs in the digital world.
Smart Contracts - The Blockchain Beyond BitcoinJim McKeeth
A smart contract is a program that runs on the blockchain. This session is a technical look at the blockchain and smart contracts from a programmer's perspective. We will start with the basics of the blockchain and work our way up through the EVM and smart contract standards. Then we will discuss alternative blockchains and the options they provide. While smart contracts are the basis of NFTs and Distributed Finance (DiFi), this session's focus is on technology and will explore many potential uses, including an introduction to Solidity and other smart contract programming languages.
Presented at the Boise Software Developers Group on September 12th, 2023
The Blockchain - The Technology behind Bitcoin Jérôme Kehrli
The blockchain and blockchain related topics are becoming increasingly discussed and studied nowadays. There is not one single day where I don't hear about it, that being on linkedin or elsewhere.
I interested myself deeply in the blockchain topic recently and this is the first article of a coming whole serie around the blockchain.
This presentation is an introduction to the blockchain, presents what it is in the light of its initial deployment in the Bitcoin project as well as all technical details and architecture concerns behind it.
We won't focus here on business applications aside from what is required to present the blockchain purpose, more concrete business applications and evolutions will be the topic of another presentation I'll post in a few weeks
Blockchain is a decentralized and distributed ledger system. In blockchain technology, the data is stored within blocks and then linked to one another, forming a chain of blocks. Some of the key features of blockchain include – immutability, decentralized, enhanced security, consensus protocol, and faster output.
Although blockchain offers a lot of benefits for a lot of sectors, it still comes with its fair share of disadvantages. Most blockchain platforms are still not scalable enough. Some of the public blockchain platforms, such as Bitcoin or Ethereum, are not energy efficient.
Blockchain can be inefficient under certain conditions. The efficiency of blockchain technology varies from platform to platform. Implementing blockchain-based solutions from scratch is a costly investment.
If you want to invest in blockchain technology, it’s best to learn more about the technology from a reliable source. At 101 Blockchains, we offer the best of the best courses on blockchain technology to help you understand the true potential of this new tech.
You can learn more about this from here ->
Blockchain Like a Boss Masterclass
https://academy.101blockchains.com/courses/blockchain-masterclass
Ethereum Development Fundamentals
https://academy.101blockchains.com/courses/ethereum-development-fundamentals
Beginner’s Guide to Corda Development
https://academy.101blockchains.com/courses/beginners-guide-to-corda-development
Hyperledger Fabric Development Course
https://academy.101blockchains.com/courses/hyperledger-fabric-development-intermediate-level
We also offer lucrative certification courses for professionals. Learn more about these courses from here ->
Certified Enterprise Blockchain Professional (CEBP) course
https://academy.101blockchains.com/courses/blockchain-expert-certification
Certified Enterprise Blockchain Architect (CEBA) course
https://academy.101blockchains.com/courses/certified-enterprise-blockchain-architect
Certified Blockchain Security Expert (CBSE) course
https://academy.101blockchains.com/courses/certified-blockchain-security-expert
Learn more from our full guide on this topic ->
https://101blockchains.com/disadvantages-of-blockchain/
According to Claude Shannon, confusion and diffusion are two key properties for building strong encryption algorithms. Confusion obscures the relationship between the ciphertext and key by having each ciphertext bit depend on multiple key bits. Diffusion spreads the influence of each plaintext symbol over many ciphertext symbols. Modern block ciphers use repeated rounds of confusion and diffusion operations to build strong encryption.
This is an introduction to the exciting technology powering innovation in finance, contracting and many technology industries. This slideshow touches on the blockchain; what it is, its applications, it's disruptions and future cycle projections. The slideshow also touches on bitcoin as a popular application of blockchain technology.
The document discusses the core components and architecture of blockchain technology. It describes the key elements like nodes, transactions, blocks, chains, miners, and consensus protocols. It also explains the three main types of blockchain - public, private, and consortium blockchains. Public blockchains allow anyone to participate, private blockchains are controlled by a single organization, and consortium blockchains involve multiple organizations with pre-defined roles. Permissionless blockchains like Bitcoin use proof-of-work, while permissioned blockchains have validated nodes.
This document provides an introduction to blockchain technology including general concepts, how it guarantees security, and technical details. It discusses how blockchain uses cryptography to store data in a growing list of blocks that are linked together to form a distributed ledger. This ensures security and privacy without centralized control. Examples of potential blockchain applications are also given such as smart appliances, supply chain management, smart contracts for industries like healthcare, music, and government, as well as identity verification.
The document discusses how blockchain can enhance cyber security. It outlines several types of common cyber attacks and how blockchain could help address them. Blockchain could provide a decentralized storage medium, more secure DNS, and secure edge device authentication through identity verification. Additional benefits include distributing public keys, mitigating DDoS attacks, and verifying software downloads. The future of blockchain-based cyber security is promising as it ensures data privacy and security in a way that keeps pace with increasing cybercrime.
This document summarizes a colloquium on digital signatures presented by Prashant Shekhar. It introduces digital signatures as a way to authenticate electronic documents through a mathematical scheme. It discusses how digital signatures work using public and private keys along with digital certificates from a certification authority. The document also outlines some applications of digital signatures like email, data storage, funds transfer, and software distribution. It concludes by noting advantages like authentication, integrity, and non-repudiation, as well as disadvantages such as expiration of certificates and costs of software.
The document discusses the potential benefits of blockchain technology for digital transactions. It explains that blockchain relies on consensus, smart contracts, and cryptography to create a decentralized ledger system that does not require trusted third parties. This could make transactions more efficient, less costly, and more secure compared to traditional centralized ledger systems. The document also provides several examples of how blockchain is being applied to areas like financial services, trade finance, real estate transactions, and the Internet of Things through companies in Singapore. However, it notes there are still uncertainties around security, implementation costs, and privacy that could limit blockchain adoption.
A blockchain is a decentralized, distributed ledger that records transactions in digital blocks connected through cryptography. Each new block must be validated by the network through a process of verification and consensus before being added to the chain. This validation process ensures security and transparency without the need for a central authority. Advantages of blockchain technology include increased transparency through an openly viewable record of transactions, enhanced security through encryption, and decentralization that avoids single points of failure. Examples of blockchain applications include decentralized social networks, marketplaces, and ridesharing platforms that operate without central operators by leveraging blockchain and cryptocurrency technologies.
A firewall is a system designed to restrict access between networks and protect private network resources. It imposes a gateway machine between the outside world and private network that software uses to decide whether to allow or reject incoming traffic. Firewalls implement security policies at a single point and monitor security events while providing strong authentication and allowing virtual private networks on a specially hardened operating system. Common types include packet filtering routers, application-level gateways, and circuit-level gateways, with hybrid firewalls combining techniques.
Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation.
Blockchain is a decentralized database that maintains a continuously growing list of records called blocks. Each block contains transaction data and a link to the previous block. The first block is special as it has no preceding block. Blocks are linked through cryptography, forming a chain. Miners process transactions by solving complex math problems to find new blocks and receive rewards. The first application was Bitcoin, solving the double spending problem without a central authority. Other applications include Ethereum, Litecoin, Ripple, and SolarCoin. Key variables that impact the blockchain include block size, header size, and transaction size.
Consensus algorithms are an extremely crucial part of blockchain technology. Proof of Work is a type of consensus mechanism where users use their computational devices to solve complex mathematical problems in order to verify and add blocks to the ledger system. On the other hand, in Proof of Stake users will need to stake their coins in order to participate in the verification process.
The difference between the two types of consensus protocol lies within the working mechanism of these two processes. Verification mechanism, incentive policy, vulnerability, motivation, requirement, and scalability are some of the areas where these two differ.
To help you better understand the differences between these two consensus protocols, 101 Blockchain offer an array of lucrative blockchain courses. These courses will help you comprehend the working principles of these two algorithms.
The following courses will help you learn about PoW and PoS->
Blockchain Like a Boss Masterclass
https://academy.101blockchains.com/courses/blockchain-masterclass
Getting Started with Bitcoin Technology
https://academy.101blockchains.com/courses/getting-started-with-bitcoin-technology
Learn more about the certification courses from here ->
Certified Enterprise Blockchain Professional (CEBP) course
https://academy.101blockchains.com/courses/blockchain-expert-certification
Certified Enterprise Blockchain Architect (CEBA) course
https://academy.101blockchains.com/courses/certified-enterprise-blockchain-architect
Certified Blockchain Security Expert (CBSE) course
https://academy.101blockchains.com/courses/certified-blockchain-security-expert
Learn more from our guide ->
https://101blockchains.com/pow-vs-pos-a-comparison/
Hyperledger Fabric is a permissioned blockchain framework that provides confidential transactions and smart contract functionality. It uses channels to isolate data on the ledger and provide private and confidential transactions between authorized participants. Key components include assets that represent real-world value, chaincode/smart contracts that define transactions and update assets on the ledger, and a ledger to record the immutable transaction history.
Introduction to Blockchain
History of Blockchain
How Blockchain works
Blockchain platforms
Blockchain consensus/validation algorithms
Proof-of-work algorithm (PoW)
Practical byzantine fault tolerance algorithm (PBFT)
Proof-of-stake algorithm (PoS)
Delegated proof-of-stake algorithm (DPoS)
Who uses blockchain
Advantages and disadvantages of blockchain
Blockchain is the technology that underpins cryptocurrencies like Bitcoin. It uses cryptography and a peer-to-peer network to securely record transactions in a distributed ledger called a blockchain. The blockchain grows as "blocks" of new transactions are added together in a chain, with each block timestamped and linked to the previous one. This allows transactions to be permanently recorded and verified in an open yet secure distributed manner without the need for a centralized authority. Potential applications of blockchain technology include banking, payments, voting, and more.
This document provides an overview of blockchain technology. It begins with definitions, explaining that blockchain is a public ledger of transactions distributed across a peer-to-peer network with no central authority. It then describes how blockchain works, including how transactions are grouped into blocks and added to the chain in a way that can never be erased. The three key pillars of blockchain - decentralization, transparency, and immutability - are also summarized. Potential applications for blockchain technology are listed across various industries. Both pros and cons of blockchain are identified. The document concludes by suggesting that blockchain will continue gaining widespread adoption as its practical applications become more established.
How Blockchain Development Can Revolutionize Your Digital Strategy.pdfPixel Softwares
Reinvent Digital Dynamics: Embrace the power of blockchain technology to reimagine your digital strategy. With decentralized solutions and smart contracts, Pixel Softwares can revolutionize your business landscape.
Blockchain is a distributed database or digital ledger of transactions that is duplicated and shared among members of a network. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data. By design, blockchains are inherently resistant to modification of the data. The blockchain serves as an open, distributed ledger that can record transactions between parties efficiently and in a verifiable and permanent way, without the need for a central authority. This document provides an overview of blockchain technology, including its fundamentals, types, how it works, applications, advantages, and disadvantages.
Blockchain- The Quiet Disruptor - A Guide and a primer to launch Blockchain &...JP Batra
This is a guide and a primer to help you get ready to bring Blockchain technology solutions to your company. Titled "Blockchain - The Quiet Disruptor!" as presented at Global Blockchain Summit in Westminster, Colorado, this is a guide first develops a foundation through a high level understanding of:
* Inefficiencies we are used to, and how Blockchain removes them or reduces their impact
* Main strengths of Blockchain technology
* Public vs. Private Blockchain at a high level
* Business level view of how the technology works, or it's interworking
* Myths surrounding Blockchain, e.g., Blockchain vs Bitcoin, Blockchain vs. DLT as a summary table
* Various consortiums and alliances that developed platforms for use in their industries represented as a table
After foundational work, the presentation and the narratives tie all the foundational blocks together through a hypothetical Healthcare Insurance use case. It also describes the importance of technology selection, Minimum Viable Product (MVP) and Proof of Concept (POC) to test the applicability of Blockchain to a use case one may have developed.
Links have been added to supporting articles to get one prepared for developing their own use cases and help their company gain a competitive advantage or respond fast to competitor threats.
Blockchain technology allows for a distributed ledger of transactions and digital events that is shared among participants in a network. It allows transactions to be verified through consensus, recorded immutably on the blockchain, and provides a verifiable record of all transactions. The document discusses how blockchain works through public and private networks and provides examples of applications in supply chain management, the Internet of Things, tracking origins of goods, and smart contracts. It also covers challenges and opportunities of adopting blockchain technology.
Blockchains provide a tamper-proof record of transactions that can improve trust between entities that do not fully trust each other. Paper documents are easy to forge, while blockchains allow for digital records with guaranteed authenticity. Where data is held centrally, blockchains can demonstrate the data is tamper-proof rather than requiring third-party audits. Blockchains eliminate the need for third parties in financial transactions by providing a distributed, transparent record validated across many participants.
The document discusses blockchain technology. It defines blockchain as a distributed database or ledger that stores information across a network of computers. It explains how blockchain works by structuring data into time-stamped blocks that are linked together in a chain. It then covers key aspects of blockchain like decentralization, transparency, security, and applications such as cryptocurrencies, smart contracts, and supply chain management. The benefits are highlighted as improved accuracy, lower costs, decentralization, and efficient transactions.
Blockchain technology allows data to be stored and exchanged on a peer-to-peer network in a secure and decentralized manner without intermediaries. It works by validating transactions and adding them as blocks to an immutable blockchain that is shared across all nodes in the network. Blockchains use cryptography to ensure data integrity and prevent alteration of past records. Real-world applications of blockchain include powering cryptocurrencies like Bitcoin, implementing smart contracts, building decentralized applications, and developing government services like in Dubai.
BASIC INTRODUCTION TO BLOCKCHAIN - JOEL SUMANTH RAJ.pdfJOELCONTACTS
Blockchain Technology is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. An asset can be tangible (a house, car, cash, land) or intangible (intellectual property, documents, contracts, patents, copyrights, branding).
How does the Blockchain Work?
A blockchain is a distributed, peer-to-peer database that hosts a continuously growing number of transactions. Each transaction, referred to as a “block,” is secured through cryptography, timestamped, and validated by every authorized member of the database using consensus algorithms (i.e., a set of rules). A transaction that is not validated by all members of the database is not added to the database. Every transaction is attached to the previous transaction in sequential order, creating a chain of transactions (or blocks). A transaction cannot be deleted or edited, thereby creating an immutable audit trial. A transaction can only be changed by adding another transaction to the chain.
Pros and Cons of Blockchain Technology: Your Complete Go-to GuidePixel Crayons
The benefits of Blockchain are many, but do you know what makes it the need of the hour? Multiple participants manage its decentralized database known as Distributed Ledger Technology (DLT).
Yes, Blockchain is a disruptive technology compared to traditional database systems. Besides, not a single entity controls it; there is no chance of exploitation or suppression from any one party. As a business owner, I know you might be thinking of adopting Blockchain; however, you are still unsure about it.
To take you out of this dilemma, I am here to discuss some most prominent pros and cons of Blockchain. So, get ready to dive deep and discover some amazing Blockchain pros along with some blockchain cons.
Since the technology is not so old and needs expertise, always hire a trusted Blockchain development company.
Blockchain technology is a revolutionary way of storing and transferring data. While it has its share of cons, it is possible to rectify most of them with the right planning and execution. The current state of blockchain technology makes it the best suit for businesses that want to take advantage of its distributed ledger features. However, the technology is not simple as it seems to be. Hence, I would once again recommend you to hire Blockchain developers with experience and the right skills in Blockchain development services. Otherwise, your business may suffer.
Blockchain Computing: Prospects and Challenges for Digital Transformation Pr...eraser Juan José Calderón
Blockchain Computing: Prospects and Challenges for Digital Transformation . Professor Syed Akhter Hossain.
Abstract:
A revolutionary trustable sharable computing outcome, the blockchain is essentially a distributed database of records or public ledger of all transactions originated from digital events and shared among participating parties within a computing framework. Each transaction of the chain in the public ledger is verified by consensus of a majority of the participants in the system and its constituents. Once recorded, information can never be erased and neither altered. The blockchain contains a certain and verifiable record of every single transaction ever made during the business operations. In general sense, the blockchain could be described simply as being a way of storing the information of a transaction, between multiple parties in a trustable way. Recording, sharing, storing and redistributing contents in a secure and decentralized way. Being owned, run and monitored by everybody and without anyone controlling it. Besides, avoiding any kind of modifications or abuses from a central authority. Blockchain technology is non-controversial and has worked flawlessly over the last few years and is being successfully applied to both financial and non-financial world applications and listed as as the most important invention since the Internet itself. Besides, digital transformation is taking off as rapid agent for change as part of the global business convergence. In this article, detail of blockchain technologies is presented from the pe
Blockchain Technology Developments in Government 3.0samossummit
Blockchain technology can be categorized as public, private, or consortium blockchains. Public blockchains allow any node to participate in consensus, private blockchains are controlled by one organization, and consortium blockchains have a selected set of nodes to validate blocks. Key characteristics of blockchain include decentralization, immutability, anonymity, and auditability. Blockchains use consensus algorithms like proof-of-work to validate transactions and add blocks of transactions to the distributed ledger in a secure, decentralized manner. Blockchain technology has applications in areas like finance, government services, healthcare, and more.
Blockchain could be a data structure that could be a growing list of informat...Richa575316
Blockchain is a distributed ledger of transactions or digital events that is shared among participants in a network. Each transaction is verified by consensus of participants and stored in a chronological and immutable chain of blocks. Blockchain technology was introduced with Bitcoin in 2008 as a way to record cryptocurrency transactions in a verifiable and permanent way without the need for a central authority. Common applications of blockchain include cryptocurrencies, smart contracts, supply chain management, digital identity, and decentralized systems.
This document discusses incorporating blockchain technology into supply chain management for tracking items through the supply chain and beyond. It begins with an executive overview, then provides background on blockchain including how it uses distributed databases of linked blocks to securely record transactions and share information. The document outlines potential applications of blockchain for supply chain management, as well as current commercial uses and alternative blockchain designs being developed.
The term blockchain is often heard in context with banking, investing, or cryptocurrency. You may have heard about it in passing, but do you know what exactly blockchain is? And what is the role of miners? Let’s find out.
Yao Yao, Jack Rasmus-Vorrath, Ivelin Angelov
https://github.com/yaowser/basic_blockchain
https://www.slideshare.net/YaoYao44/blockchain-security-and-demonstration/
Distributed ledger technology over a network of computers, which provides an alternative to the centralized system
Distributed Database
Peer-to-Peer Transmission
Transparency with Pseudonymity
Records are immutable
Computational Logic
https://www.youtube.com/watch?v=5ArZxRdhyPc
Blockchain technology is gaining significant attention and investment from major banks and financial institutions. Banks are projected to invest $400 million in blockchain by 2019, and over 30% of firms surveyed have annual blockchain budgets over $5 million. Blockchain uses distributed ledger technology to securely record transactions in digitally recorded "blocks" that are linked together, allowing participants on a blockchain network to reach consensus on a single view of the truth. This consensus-based approach provides advantages over traditional centralized databases by enabling trustless verification and transparency across organizations without the need for intermediaries.
Blockchain technology and logistics managementJayakumar PP
Basic understanding of Blockchain Technology. Give special focus to the application of blockchain in Logistics Management and Supply chain. It covers the following topics
Introduction to the blockchain, The current situation in the logistics industry, The Blockchain technology - the paradigm shifter in logistics, Block Chian Technology - Explain technology aspects and features, Basics on Blockchain security, Blockchain capabilities and its advantages to the logistics industry, Value-added to the industry, Implementation challenges, Finally with the conclusion and one best practice with ship chain company.
Blockchain is a distributed ledger or record of transactions shared across a network of computers. Each transaction on the blockchain is recorded and stored on the blockchain through a complex validation process without the need for a central authority. Blockchain provides advantages of openness and transparency as anyone can view transaction records, collective maintenance as many nodes can participate to validate transactions, and reliability through data backups across nodes. Due to these advantages, blockchain has promising applications in many fields like finance, healthcare, supply chains and more.
Similar to Application of Blockchain Technologies in Digital Forensics (20)
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfMahdi_Fahmideh
This document summarizes Mahdi Fahmideh's background and expertise in developing blockchain-based information systems. It discusses key components of blockchain technology including decentralized distributed ledgers, immutable transaction records, consensus mechanisms, and smart contracts. It also outlines some challenges in developing blockchain systems related to security, privacy, scalability and performance, and interoperability.
The document summarizes Mahdi Fahmideh's presentation on developing IoT based systems. It discusses key challenges in IoT development including security, interoperability, scalability, and data management. It emphasizes the importance of using information systems development methods to manage complexity when building IoT platforms. The presentation then outlines a generic IoT development method including phases, roles, and models. It provides recommendations for designing IoT methods and implications for research including tailoring methods based on scenarios and addressing requirements analysis and human aspects of IoT development.
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
Digital Forensics for Artificial
Intelligence (AI ) Systems:
AI systems make decisions impacting our daily life Their actions might cause accidents, harm or, more generally, violate
regulations either intentionally or not and consequently might be considered suspects for various events. In this lecture we explore how digital forensics can be performed for AI based systems.
Certificate for Contributions as a Reviewer for the Journal of Software and S...Mahdi_Fahmideh
The success of any academic journal depends on the volunteer effort and commitment to service by reviewers. The leading Journal of Software and Systems Modeling (SoSyM) gave me a certification for my contributions as a reviewer.
Didar Zowghi from the University of Technology Sydney was awarded a Best Paper certificate for his presentation entitled "IoT Smart City Architectures: An Analytical Evaluation" at the 9th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEEE IEMCON 2018) held from November 1-3, 2018 at the University of British Columbia in Canada. The certificate recognizes Zowghi for presenting the best paper at the conference.
The 1st workshop on engineering processes and practices for quantum software ...Mahdi_Fahmideh
This document summarizes a presentation on developing quantum software engineering practices for quantum algorithm development for multiphysics simulations. It discusses Quanscient's work on developing quantum-native simulation algorithms like the Quantum Lattice-Boltzmann Method. It notes that quantum software engineering has some peculiarities due to the non-deterministic nature of quantum computations and immaturity of quantum hardware. It also describes an ongoing case study developing a flexible Quantum Lattice-Boltzmann module using an API and discusses some challenges of applying agile practices to quantum software development.
The reviewer is thanked for their work reviewing paper submissions for the Australasian Conference on Information Systems (ACIS) 2022. Their reviews are valuable for submitters, many of whom are PhD students. The program co-chairs of ACIS 2022 expressed their appreciation for the reviewer's contributions.
Role of ontologies in beach safety management analytics systemsMahdi_Fahmideh
Events at public beaches are one of the most popular recreational activities of local communities and international visitors in all places around the world. Amongst others, the beach safety management in protected areas needs support for continuous analysis and decision making on incidents at the beach areas. There is a lack of available standard models to assist data scientists to represent analytics models including different spheres of interplay domain variables related to beach safety management. Using the Design Science Research Methodology (DSRM), we developed ontological models that facilitate a unified representation and maintenance analytics models. We contribute to the ontology design theory for analytics models underlying analytics systems for the beach safety management domain. Our research findings can be used in the general class of ontology design problem for analytics systems in practice.
The document describes Dr. Mahdi Fahmideh's background and research interests which include disruptive technologies like cloud computing, IoT, blockchain, and data analytics. It provides examples of Dr. Fahmideh's research output, including a process model developed using design science research for migrating legacy applications to the cloud. The document identifies knowledge gaps in the current literature around cloud migration processes and outlines Dr. Fahmideh's research objective to develop a generic, customizable cloud migration process model.
The 27th Australasian Conference on Information SystemsMahdi_Fahmideh
Many organisations are currently moving their legacy systems to the cloud as it offers reduced cost, improved operational efficiency, on-demand, and pay-as-you-go service models. While any cloud migration scenario to make legacies cloud-enabled may have their own characteristics, there is no universally superior or applicable method for all scenarios. In situations like this, designing customization methods that fit characteristics of migration scenarios would be pivotal for successful adoption of cloud computing. The literature review reveals that issues surrounding method tailoring for the cloud migration have so far been missing and this is despite the call made by previous researches to adopt a tailoring perspective to the cloud enablement. To effectively address this shortcoming, this study applied the idea of situational method engineering to develop a framework which facilitates the design and maintenance of bespoke cloud migration methods. The paper demonstrates the applicability of the proposed framework via presenting two scenarios.
A Model-Driven Approach to Support Cloud Migration Process- A Language Infras...Mahdi_Fahmideh
Adoption of cloud computing as a new outsourcing strategy has grown rapidly among IT-based organisations in recent years. Research around migrating legacy systems to cloud environments is proliferated with a variety of approaches that often narrow down in technical details. However, an overarching and integrated view of cloud migration process does not exist in the current literature. As an at-tempt to ameliorate this shortcoming, this research applies a metamodeling approach and develops a generic cloud migration process model derived from the extant cloud migration literature. The proposed metamodel is not dependent or restricted to any specific cloud platform; rather it is an abstraction of phases, activities, tasks, and work-products that are incorporated in a typical migration process. It underpins a high-level and conceptual view of cloud migration process and acts as a reusable knowledge repository to design situation-specific migration process models for a given migration scenario at hand.
Delegation Inheritance in Odoo 17 and Its Use CasesCeline George
There are 3 types of inheritance in odoo Classical, Extension, and Delegation. Delegation inheritance is used to sink other models to our custom model. And there is no change in the views. This slide will discuss delegation inheritance and its use cases in odoo 17.
How to Install Theme in the Odoo 17 ERPCeline George
With Odoo, we can select from a wide selection of attractive themes. Many excellent ones are free to use, while some require payment. Putting an Odoo theme in the Odoo module directory on our server, downloading the theme, and then installing it is a simple process.
Beginner's Guide to Bypassing Falco Container Runtime Security in Kubernetes ...anjaliinfosec
This presentation, crafted for the Kubernetes Village at BSides Bangalore 2024, delves into the essentials of bypassing Falco, a leading container runtime security solution in Kubernetes. Tailored for beginners, it covers fundamental concepts, practical techniques, and real-world examples to help you understand and navigate Falco's security mechanisms effectively. Ideal for developers, security professionals, and tech enthusiasts eager to enhance their expertise in Kubernetes security and container runtime defenses.
How to Add Colour Kanban Records in Odoo 17 NotebookCeline George
In Odoo 17, you can enhance the visual appearance of your Kanban view by adding color-coded records using the Notebook feature. This allows you to categorize and distinguish between different types of records based on specific criteria. By adding colors, you can quickly identify and prioritize tasks or items, improving organization and efficiency within your workflow.
AI Risk Management: ISO/IEC 42001, the EU AI Act, and ISO/IEC 23894PECB
As artificial intelligence continues to evolve, understanding the complexities and regulations regarding AI risk management is more crucial than ever.
Amongst others, the webinar covers:
• ISO/IEC 42001 standard, which provides guidelines for establishing, implementing, maintaining, and continually improving AI management systems within organizations
• insights into the European Union's landmark legislative proposal aimed at regulating AI
• framework and methodologies prescribed by ISO/IEC 23894 for identifying, assessing, and mitigating risks associated with AI systems
Presenters:
Miriama Podskubova - Attorney at Law
Miriama is a seasoned lawyer with over a decade of experience. She specializes in commercial law, focusing on transactions, venture capital investments, IT, digital law, and cybersecurity, areas she was drawn to through her legal practice. Alongside preparing contract and project documentation, she ensures the correct interpretation and application of European legal regulations in these fields. Beyond client projects, she frequently speaks at conferences on cybersecurity, online privacy protection, and the increasingly pertinent topic of AI regulation. As a registered advocate of Slovak bar, certified data privacy professional in the European Union (CIPP/e) and a member of the international association ELA, she helps both tech-focused startups and entrepreneurs, as well as international chains, to properly set up their business operations.
Callum Wright - Founder and Lead Consultant Founder and Lead Consultant
Callum Wright is a seasoned cybersecurity, privacy and AI governance expert. With over a decade of experience, he has dedicated his career to protecting digital assets, ensuring data privacy, and establishing ethical AI governance frameworks. His diverse background includes significant roles in security architecture, AI governance, risk consulting, and privacy management across various industries, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: June 26, 2024
Tags: ISO/IEC 42001, Artificial Intelligence, EU AI Act, ISO/IEC 23894
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
Front Desk Management in the Odoo 17 ERPCeline George
Front desk officers are responsible for taking care of guests and customers. Their work mainly involves interacting with customers and business partners, either in person or through phone calls.
How to Configure Time Off Types in Odoo 17Celine George
Now we can take look into how to configure time off types in odoo 17 through this slide. Time-off types are used to grant or request different types of leave. Only then the authorities will have a clear view or a clear understanding of what kind of leave the employee is taking.
Slide Presentation from a Doctoral Virtual Open House presented on June 30, 2024 by staff and faculty of Capitol Technology University
Covers degrees offered, program details, tuition, financial aid and the application process.
Credit limit improvement system in odoo 17Celine George
In Odoo 17, confirmed and uninvoiced sales orders are now factored into a partner's total receivables. As a result, the credit limit warning system now considers this updated calculation, leading to more accurate and effective credit management.
Webinar Innovative assessments for SOcial Emotional SkillsEduSkills OECD
Presentations by Adriano Linzarini and Daniel Catarino da Silva of the OECD Rethinking Assessment of Social and Emotional Skills project from the OECD webinar "Innovations in measuring social and emotional skills and what AI will bring next" on 5 July 2024
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...Neny Isharyanti
Presented as a plenary session in iTELL 2024 in Salatiga on 4 July 2024.
The plenary focuses on understanding and intepreting relevant TPACK competence for teachers to be adept in teaching multimodality in the digital age. It juxtaposes the results of research on multimodality with its contextual implementation in the teaching of English subject in the Indonesian Emancipated Curriculum.
The membership Module in the Odoo 17 ERPCeline George
Some business organizations give membership to their customers to ensure the long term relationship with those customers. If the customer is a member of the business then they get special offers and other benefits. The membership module in odoo 17 is helpful to manage everything related to the membership of multiple customers.
Application of Blockchain Technologies in Digital Forensics
1. CIS8708-Digital Forensics
(Guide to Computer Forensics and
Investigations)
Chapter 7
Application of Blockchain Technologies in
Digital Forensics
Dr. Mahdi Fahmideh
School of Business
University of Southern Queensland (UniSQ)
2. Part 1- An Introduction to Blockchain
Technologies
3. Overview
Many scientific and practical areas have shown increasing interest in reaping the
benefits of blockchain technology to empower software systems.
Blockchain based systems use concepts and technologies popularized by
cryptocurrencies such as Bitcoin – highly decentralized, open transaction ledgers with
immutable content.
Blockchain technologies provide advantages including transparent operations, user
anonymity, auditability, and high scalability.
Over 3,000 blockchain software projects had been hosted on GitHub in March 2018 and
that this number had been sharply doubled to nearly 6,800 in October of the same year.
Some industrial domains have already developed blockchain based systems and others
are still figuring out a reasonable use case to offer new blockchain based systems for
transactional digital services.
4. Foundation
Blockchain is commonly rooted in a few core elements that systems are built upon.
A distributed ledger is a form of a shared database that may exist across multiple locations and
among several participants.
It enables parties to authenticate, process, and validate transactions without the need for
central authority or intermediary.
A type of distributed ledger.
No need to intermediary
Peer to peer network
It is viewed as a promising initiative for the secured and reliable next generation of Internet-
Based information technologies.
5. Foundation (cont.)
Blockchain
an accounting book or digital distributed database.
a chain of blocks (i.e., records) that are sequentially linked together.
each block depends on its predecessor block and is secured via cryptography
techniques.
a block contains transactional data, a time stamp, and a hash value of its previous block.
6. Foundation (cont.)
Blockchain
The chain of blocks is stored on a distributed network of nodes where each node contains a copy
of the entire blockchain
The chain is visible and verifiable by all nodes participating in the network.
Once a block with its own time-stamp is appended to the chain, the creator node broadcasts that
block to all the other nodes in the peer-to-peer distributed network.
Once nodes receive the block, they validate it via predefined check and add the block to their
own local blockchain copy to provide a single source of truth.
The data records in a block are non-reversible, transparent, and become an immutable part of
blockchain after they are accepted by all nodes.
Such a chain of blocks provides a secured means of information exchange between systems
without involving a trusted third party and is suitable for record-keeping operations such as
financial transactions, medical records, and so on
7. Once the smart contract is deployed into the blockchain, the contract code cannot be
changed (or might be difficult to change!). To run a contract, users can simply send a
transaction to the contract’s address. This transaction will then be executed by every
consensus node (called miners) in the network to reach a consensus on its output. The
smart contract’s state will then be updated accordingly. The smart contract can, based
on the transaction it receives, read/write to its private storage, store money into its
account balance, send/receive messages or money from users/other smart contracts or
even create new smart contracts.
Foundation (cont.)
8. Blockchain Append-Only
Within the public blockchain world, every full node on the network is its own
administrator, where it can Create (e.g. add) and Read; this is also known as
Read/Write access (e.g. append-only).
These nodes only add more data over time in the form of blocks, but all previous
data is permanently stored and cannot be altered.
Read: query (e.g. search) and retrieve data from the blockchain
Write: add more data onto the blockchain.
For example, if the blockchain has recorded that our Bitcoin wallet has 1 million
BTC, that figure is permanently stored in the blockchain. When we spend
200,000 BTC, that transaction is recorded onto the blockchain, bringing our
balance to 800,000 BTC. However, since the blockchain can only be
appended, our pre-transaction balance of 1 million BTC also remains on the
blockchain permanently, for those who care to look. This is why the blockchain is
often referred to as an immutable and distributed ledger.
8
9. Disintermediation - Trust Through
Transparency
Blockchain has a powerful disintermediation effect.
Nodes on the network are allowed to place data directly onto the database that is
shared.
This eliminates the need for an intermediary to do such task.
Developers can create a distributed ledger on a blockchain, and use cryptography to
give people secure storage space on that ledger.
This creates a very different world than what we have come to know today,
because for the first time in the digital world, people are allowed to own their own data.
"How is this different from the current technology?"
9
10. Transparency of Blockchain
The blockchain is designed so that its entire history is visible and unchangeable
(immutable).
Transactions in the blockchain cannot be modified after creation, and their
complete history is publicly visible.
This means that the blockchain is a completely transparent data structure with
the useful property that the integrity of the blockchain is easily verifiable by any
user.
10
11. Transparency: Databases vs. Blockchain
Traditional databases and the blockchain were created for different purposes and
have different levels of transparency.
Traditional databases have low transparency since values can be modified or
deleted;
however, this changeability allows them to store data in an efficient manner, with only the
most relevant versions of each value retained in storage.
The blockchain is publicly visible and immutable,
meaning that it has very high transparency.
Its append-only structure and decentralized storage sacrifice storage efficiency for
trustworthiness of the stored data.
11
12. Ownership of data
Today, organizations use our data, sell our data, store our data, and exchange our
data.
Data is an extremely powerful asset and to own your own data is a vast change to
the current system.
In a world powered by blockchain, having ownership of your database is truly
empowering.
You can now share the information that you choose with any organization that you
desire.
With the current system of intermediaries, when you go out to eat at a restaurant,
and you pay with your credit or debit card, you're not paying the restaurant directly.
Instead, a database record at your bank is being debited and the database record at
their bank is being credited.
12
13. Use Cases
In a public blockchain solution like Ethereum, because they're anonymous and we
have no concept of identity, we have no way of treating users differently.
And so all data on a public blockchain is transparent and visible to all other participants.
And this is really important. It adds a lot of value, when we're talking about
exchanging currency or tokens of monetary value, because as long as we can
protect the anonymity of the participants, it gives us a great way for anybody to
validate the details of any transaction on a ledger that is immutable, permanent,
can't be changed and offers a high degree of trust.
This also has a lot of other really interesting potential use cases that we're starting
to explore with public blockchain technology, voting and voter registration, tracking
election results.
These kind of things are very good use cases for having that level of public
transparency.
13
14. Smart contracts
A key element of blockchain technology is the ability to
create and run smart contracts.
Translating the clauses of a business contract into code
and embedding them into software or hardware to make
them automated and self-execute.
“an automatable and enforceable agreement. Automatable
by computer, although some parts may require human
input and control. Enforceable either by legal enforcement
of rights and obligations or via tamper-proof execution of
computer code”
C. D. Clack, V. A. Bakshi, and L. Braine, "Smart contract
templates: foundations, design landscape and research
directions," https://arxiv.org/abs/1608.00771, 2016.
24. Future of blockchain smart contracts
Blockchain smart contracts have shown promising potential to improve business
workflows.
However, blockchain smart contracts are still an ever-growing field in information
technology.
We still unsure what, how, and why blockchain smart contracts are beneficial for
business enterprises with critical business workflows and data?
Which workflows are (not) capable to benefit from smart contracts?
What obstacles/risks against adoption of smart contracts?
How to ensure/test that smart contracts really work as accurate as
conventional/textual contracts?
??
Smart contract project failures
Some organisations switched back from blockchain smart contracts to on-premise.
Application of blockchain smart contracts in digital forensics is still immature. We
don’t know if smart contracts really will replace conventional digital forensics
workflows.
25. Part 2- Applications of Blockchain Smart
Contract Technologies in Digital Forensics
26. Advantages of using blockchain technology in digital forensics investigation
1.Transparency and Traceability: Blockchain transactions and smart contracts are recorded on a distributed ledger, which offers
transparency and traceability. This can provide investigators with a verifiable and auditable trail of transactions and actions,
allowing them to track and analyze digital evidence in a more reliable and tamper-proof manner. This can be particularly useful in
investigations involving financial transactions, supply chain management, or intellectual property disputes, where transparency
and traceability are critical.
2.Immutable Records: Blockchain transactions and smart contracts are typically immutable. They cannot be easily modified or
deleted once recorded on the blockchain. This can help preserve the integrity of digital evidence and prevent tampering, which is
crucial in maintaining the evidentiary value of data during investigation processes. Immutable records can be especially useful in
investigations where data integrity and chain of custody are paramount, such as in criminal investigations or data breach
incidents.
3.Automation : Smart contracts are self-executing and self-enforcing agreements that are automatically executed based on
predefined conditions. This can streamline processes, reduce manual errors, and improve the efficiency of investigation
processes. For example, smart contracts can automatically trigger actions, such as transferring ownership of digital assets, based
on predefined rules or events, which can save time and resources in investigations involving asset tracking, intellectual property
rights, or digital identity verification.
27. Advantages of using blockchain technology in digital forensics investigation (cont.)
4. Decentralization and Security: Blockchain technology is based on a decentralized and distributed network, which can
enhance security and resilience. Smart contracts are typically executed on the blockchain network, eliminating the need for
intermediaries and reducing the risk of single points of failure or tampering. This can increase the security and reliability of
digital evidence in investigations and protect against unauthorized access or data manipulation.
5.Enhanced Data Integrity: Blockchain technology uses cryptographic techniques to secure data integrity, ensuring that
data stored on the blockchain cannot be tampered with without detection. This can provide investigators with enhanced
confidence in the integrity of digital evidence, as any changes or alterations to the data would result in a mismatch with the
cryptographic hash stored on the blockchain. This can be particularly valuable in investigations where data integrity is crucial,
such as in intellectual property disputes or fraud investigations.
6. Digital Forensics Tool Development: The adoption of blockchain smart contracts in digital forensics investigations can
also drive the development of specialized tools and techniques for analyzing blockchain-based evidence. This can include
tools for transaction tracing, data extraction, pattern analysis, and visualization, as well as methodologies for identifying
vulnerabilities or exploits in smart contracts. This can contribute to the advancement of digital forensics as a field and support
investigators in handling blockchain-related cases more effectively.
28. How blockchain smart contracts may facilitate to digital forensic investigation processes?
Why? And what advantages and disadvantages?
30. 1. Evidence Identification: The first step is to identify and collect potential digital evidence from various sources, such as computers, mobile
devices, servers, or cloud storage. With the adoption of blockchain technology, evidence related to blockchain transactions, smart contracts, or
other blockchain-based activities can also be considered as potential digital evidence, e.g., blockchain addresses, transaction IDs, smart
contract code, or other relevant metadata associated with blockchain transactions or smart contracts.
2. Evidence Collection: Once potential blockchain-related evidence is identified, the next step is to collect the evidence using forensically
sound techniques, e.g., forensic image of relevant digital devices or collecting metadata from blockchain transactions or smart contracts using
appropriate tools and methodologies. Chain of custody and preservation of the original evidence are crucial considerations in this process to
ensure that the evidence remains admissible in court.
3. Evidence Analysis: After the evidence is collected, forensic analysis can be performed to extract relevant information from the blockchain
transactions or smart contracts, e.g., forensic tools and techniques to trace and analyse transactions, interpret smart contract code, and
understand the interactions between different blockchain entities. The transparency, traceability, and immutability features of blockchain
technology can provide valuable insights into the digital evidence and help in reconstructing the sequence of events or identifying patterns of
activity.
4. Data Correlation: Data from blockchain transactions or smart contracts can be correlated with other digital evidence, such as log files,
emails, or user accounts, to establish relationships, timelines, or dependencies. This can help in identifying relevant actors, transactions, or
activities that may be associated with the investigation.
5. Verification and Authentication: Cryptographic techniques, for example, can be used to verify the integrity of blockchain transactions or
smart contracts, ensuring that the data has not been tampered with. Digital signatures or hash values associated with blockchain transactions
or smart contracts can be used to authenticate the origin and integrity of the evidence. These verification and authentication mechanisms can
enhance the evidentiary value of blockchain-related evidence in court.
6. Reporting and Presentation: Findings can be documented in a forensic report. The report can include details of the evidence collected,
the analysis performed, the conclusions drawn, and any relevant interpretations or opinions. The report can be presented in court or to other
stakeholders as part of the investigation process, supporting the investigation findings.
7. Expert Testimony: In some cases, a digital forensics investigator may be required to provide expert testimony in court regarding the
findings from the investigation, including the analysis of blockchain-related evidence. The investigator can explain the technical details of
blockchain technology, the analysis performed on the blockchain-related evidence, and the conclusions drawn based on the findings.
Digital forensics investigation process for crims occurring in blockchain based systems
31. 1. Lack of Legal Framework: Traditional legal systems may not fully recognize or provide clear
guidelines for the use of blockchain smart contracts as evidence in court. This could result in legal
uncertainties and challenges in the admissibility and validity of blockchain-based evidence in legal
proceedings.
2.Anonymity and Privacy Concerns: Blockchain transactions are often pseudonymous or anonymous,
which can make it challenging to identify the real-world entities behind the transactions. In digital
forensics investigations, where identifying the parties involved is critical, the anonymity of blockchain
transactions may hinder the investigation process and limit the ability to trace and attribute digital
evidence to specific individuals or entities.
3.Lack of skills: Blockchain technology and smart contracts can be complex and require specialized
knowledge and expertise to understand and analyze. Digital forensics investigators may need to develop
new skills and tools to investigate blockchain-based transactions and smart contracts effectively, which
could pose a challenge in terms of resource allocation and training.
4.Immutability and Irreversibility: Blockchain transactions are typically irreversible and once recorded
on the blockchain, it will be difficult to modify or delete. This feature, while is considered a strength of
blockchain technology, can also be a challenge in digital forensics investigations where the ability to
modify or delete data for investigation purposes may be necessary.
Critical challenges for consideration when using blockchain for digital forensics investigation
32. 5.Limited Interoperability: Blockchain platforms and smart contracts may not be fully interoperable,
and different blockchains may have varying standards, protocols, and capabilities. This can create
challenges in cross-chain investigations and evidence collection, as well as hinder the interoperability of
smart contracts across different blockchain networks.
6.Smart Contract Vulnerabilities: Smart contracts are subject to coding vulnerabilities, such as bugs
or loopholes, which can result in security breaches, exploits, or unintended consequences. In digital
forensics investigations, understanding and identifying vulnerabilities in smart contracts may require
specialized technical knowledge, and the exploitation of such vulnerabilities may require legal and
ethical considerations.
7.Scalability and Performance: Blockchain networks may face challenges with scalability and
performance, including transaction processing speed and cost. Digital forensics investigations involving
large volumes of data or extensive transaction history may require significant resources and time to
analyze on blockchain networks with limited scalability, which could impact investigation timelines and
efficiency.
Critical challenges for consideration when using blockchain for digital forensics investigation (conti.)
33. Considerations for empowering digital forensics via blockchain technology?
Sample critical questions to be answered when implementing blockchain based digital forensics
What are entities (e.g., human, systems, resources) that are interacting during the investigation process?
Prosecution lawyers
Witnesses
Hard drives
etc.
What data are exchange during the interactions?
Search warrant
Digital evidence
Evidence custody form
etc.
What types of investigation processes can be more beneficial to utilize blockchain smart contracts?
Private sector vs. publica sector
Type of case
etc.
37. How data acquisition and collection can be improved via adopting blockchain smart contracts?
38. How blockchain smart contracts may facilitate the digital forensic investigation processes
that performed for crims occurring in IoT based systems, e.g., smart home?
39. References:
- Mahdi Fahmideh, John Grundy, Aakash Ahmed, Jun Shen, Jun Yan, Davoud Mougouei, Uwe, Aickelin, Babak Abedin, Engineering
Blockchain-based Software Systems: Foundations, Survey, and Future Directions, ACM Computing Surveys. 2022 Dec 7;55(6):1-44.
- Lone Auqib Hamid, and Roohie Naaz Mir, "Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger
Composer." Digital investigation 28 (2019): 44-55.
- Meng Li, Chhagan Lal, Mauro Conti, Donghui Hu, A blockchain-based lawful evidence management scheme for digital forensics. Future
Generation Computer Systems. 2021 Feb 1;115:406-20.
- Shancang Li, Tao Qin, Geyong Min. Blockchain-based digital forensics investigation framework in the internet of things and social
systems, IEEE Transactions on Computational Social Systems 6, no. 6 (2019): 1433-1441.
- Zheng, Zibin, et al. An overview on smart contracts: Challenges, advances and platforms, Future Generation Computer Systems 105
(2020): 475-491.
Editor's Notes
Photo source: Alharby, Maher, and Aad Van Moorsel. "Blockchain-based smart contracts: A systematic mapping study." arXiv preprint arXiv:1710.06372 (2017).
Photo source: Alharby, Maher, and Aad Van Moorsel. "Blockchain-based smart contracts: A systematic mapping study." arXiv preprint arXiv:1710.06372 (2017).
Photo source: Li, Shancang, Tao Qin, and Geyong Min. "Blockchain-based digital forensics investigation framework in the internet of things and social systems." IEEE Transactions on Computational Social Systems 6.6 (2019): 1433-1441.
Photo source: Lone, Auqib Hamid, and Roohie Naaz Mir. "Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer." Digital investigation 28 (2019): 44-55.
Source: Li, Meng, et al. "LEChain: A blockchain-based lawful evidence management scheme for digital forensics." Future Generation Computer Systems 115 (2021): 406-420.
Photo source: Lone, Auqib Hamid, and Roohie Naaz Mir. "Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer." Digital investigation 28 (2019): 44-55.
Photo source: Montasari, Reza. "A standardised data acquisition process model for digital forensic investigations." International Journal of Information and Computer Security 9.3 (2017): 229-249.