Kuku, Oyeyemi, Chrysikos, Alexandros and Salekzamankhani, Shahram (2025) Preparing IoT-enabled organisations for digital forensics: model for readiness and resilience. International Journal of Information Security, 24 (170). pp. 1-32. ISSN 1615-5262
IoT has embraced organisational operations by making rapid progress in creating communication and automation of data process mechanisms. Yet, it can be observed that IoT objects are quite different from traditional simple devices and can be interconnected with others, which creates great difficulties in providing their security and carrying out digital forensics. The structured, centralised and static approach of traditionally used forensic methods is also incapable of handling the opposite model of operation of IoT environments. This research aims to create a consistent roadmap for attaining forensic preparedness and cybersecurity in organisations with connected Things. This research’s contribution is methodological and practical since the analysis includes network segmentation, SIEM systems, secure communication protocols, and modern forensic approaches for security management and detecting security incidents’ occurrence. The suggested approach focuses on a secure construction of IoT architecture, adequate procedures for handling IoT-related incidents, and the advanced use of forensic tools specific to IoT platforms. Components are a gateway for maintaining Security Access Control, Cloudflare for Distributed Denial of Service attacks and S/MIME over SMTP/TLS for Communication Security. Effectiveness, efficiency and impact evidence from the implementation of the model: a) show enhanced capabilities of collecting evidence, b) increase threat identification of the event, and c) increase responder effectiveness. Other presented forensic-related indicators, including a decrease in data loss and improvements in log collection, proved that the presented approach can be effective. The work offers a full-spectrum approach to deploying IoT protection in organisations by recommending the most effective countermeasures against cyber threats and making organisations forensically ready. The analysis shows that it is increasingly crucial to incorporate sophisticated forensics and security arrangements into IoT structures while providing practical recommendations for further investigation and implementation of safety mechanisms for organisational networks.
Restricted to Repository staff only
Download (4MB) | Request a copy
![]() |
View Item |
Lists
Lists