Editorial: Volume 2, No 1 (2021) of the IJCFATI

This article introduces volume 2, no 1 (2021) for the International Journal of Cyber Forensics and Advanced Threat Investigations. The article outlines some insights, updates and summarizes the articles published in the issue. Corresponding author 1 Address: School of Science & Technology,Nottingham Trent University, 50 Shakespeare St, Nottingham NG1 4FQ

we here at International Journal of Cyber Forensics and Advanced Threat Investigations' are working to provision the quality subject matter, and expert-based papers to support our readership to meet the digital defensive objectives of the day, with this volume including some excellent papers as introduced below.
In the first article, the authors analyzed the phenomenon of advanced bot scanners by designing and implementing a platform inspired by the traditional honeypots. The authors studied specific web scraping botnets that target airlines' websites. Additionally, the article also contains a method to investigate the claim commonly made that proxy services used by web scraping bots have millions of residential IPs at their disposal. Mathematical models were proposed, which indicate that the amount of IPs is likely 2 to 3 orders of magnitude smaller than the one claimed. This finding suggests that an IP reputationbased blocking strategy could be effective, contrary to what operators of these websites think today.
The second article discusses and presents techniques and methodologies for the investigation of timestamp variations between different Raspberry Pi ext4 filesystems (Raspbian vs. UbuntuMATE), comparing forensic evidence with that of other ext4 filesystems (i.e., Ubuntu), based on interactions within a private cloud, as well as a public cloud. Sixteen observational principles of file operations were documented to assist in our understanding of Raspberry Pi's behavior in cloud environments. This study contributes to IoT forensics for law enforcement in cybercrime investigations.
The third article looks specifically at phishing and what new trends are observed due to COVID-19. The article is grounded in routine activity theory and demonstrates its relevance to both the physical and cyberspace. The implications of this research can be used by scholars who want to continue researching this new phenomenon. Practitioners can utilize the findings of this article to look for ways to improve the corporate security posture by protecting the employees and customers working from home. Developing new phishing training and awareness programs should be focused around possible scenarios involving COVID-19. the study suggests victims are more likely to fall prey to those during times of fear and uncertainty like the current pandemic.
In the fourth article, a Hot Spot Note builds on previous findings in the workshops of the EU project Next GenEration Internet Forward Strategy team. A new area of research and innovation has been introduced that focuses on both regulating device ecologies and the creation of moral and ethical guidelines for a governance model. Based on the team's previous findings, it is now believed to be the end of a paradigm of a government model that has outsourced capabilities to the market. Now, it is the time of privatizing the last public capability: identity management. This will be leading to tremendous stress in systems, services, organizational procedures, and individuals. A holistic perspective was presented to distribute security on two points: at the device level and a moral movement at a societal level. Finally, the article ends by defining a model of SSI and disposable identities.
Other notable events to report in this release are that we have expanded our advisory board to include six highly accomplished professionals to lend their knowledge and experience to underpin the IJCFATI mission, and they are as follows: • So, now to move on to the main thrust of our Journal, information. I hope you enjoy and find our latest copy of IJCFATI interesting, and above all useful.
Stay safe out there, it is a dangerous world.

Declaration of Conflicting Interest
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

Funding
The author(s) declared no financial support for the research, authorship, and/or publication of this article.