
In addition we found four main ISS goals that the CIA-triad fails to cover. Confidentiality and integrity, however, have a broader definition in the hospital-settings than the traditional definitions. We found that the CIA-triad covers three of these main-goals. Seven main ISS goals and 63 sub-goals supporting the main goals were identified. A critical view on the CIA-triad has been taken in the study, to see how it is related to a hospital setting. The purpose of the paper is to analyze the ISS goals and relate them to confidentiality, integrity and availability (CIA) that are traditional objectives for managing ISS in organizations. in the formal system, at a Swedish hospital. This paper presents findings of information systems security (ISS) goals found in policies, guidelines, and routines, i.e. Finally, this paper presents a holistic view from a literature point of view over the forensics domain in general and for IoT in particular. Moreover, the limitations of the current forensics techniques are discussed, especially in terms of issues and challenges. This would help forensics investigators to better understand the different anti-forensics tools, methods and techniques that cyber criminals employ while launching their attacks. This paper reviews the different forensics and anti-forensics methods that can be applied in the IoT domain including tools, techniques, types, and challenges, while also discussing the rise of the anti-anti-forensics as a new forensics protection mechanism against anti-forensics activities. Hence, the need for well-defined, sophisticated, and advanced forensics investigation techniques is highly required to prevent anti-forensics techniques and track down cyber criminals. However, traditional security and forensics solutions are no longer enough to prevent nor investigate such cyber attacks, especially in terms of acquiring evidence for attack investigation.

Consequently, IoT cyber-attacks are becoming more efficient and more sophisticated with higher risks and threat levels based on their more frequent likelihood to occur and their impact. Recently, cyber-criminals have kept on leveraging new skills and capabilities by conducting anti-forensics activities and employing techniques and tools to cover their tracks to evade any possible detection of the attack’s events, which has targeted either the IoT system or/and its component(s).

This resulted into both human and financial losses at all IoT levels especially individual and organization levels. Recently, the number of cyber attacks against IoT domains has increased tremendously.
