Journal of Digital Security and Forensics https://www.digitalsecurityforensics.org/digisecforensics <p>Journal of Digital Security and Forensics (ISSN- 3048-894X) is an online, half-yearly, open access, peer-reviewed journal which provides a forum to publish accessible articles describing original research in the inherently interdisciplinary cyber security, information security and digital forensic domain. This includes the security of information, computers and networks, cryptography, cyber-physical system security, digital forensics, and other related fields. This also includes digital forensic research, case studies, investigation models, investigation tools analysis, electronic evidences, reporting and future of digital forensics. In addition, the journal publishes papers that take an interdisciplinary approach to the study of cyber and information security, including topics such as international relation, data protection, privacy, ethics, legal issues, and economic implications.</p> <p>Editor-in-chief:<br />Dr. Pratosh Bansal (Professor, Department of Information Technology, Institute of Engineering &amp; Technology, Devi Ahilya Vishwavidyalaya, India)</p> <p>Managing Editor:<br />Dr. Tina Porwal (Managing Editor, Granthaalayah Publications and Printers, 109/C, Sukhdev Nagar Ex2, Airport Road, Indore, 452005, India)</p> Granthaalayah Publications and Printers en-US Journal of Digital Security and Forensics 3048-894X <p>With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.</p> <p>It is not necessary to ask for further permission from the author or journal board. </p> <p>This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.</p> COMPARISON OF CHARACTERISTIC FEATURES OF INKJET PRINTERS OF DIFFERENT MAKE AND MODEL USING VIDEO SPECTRAL COMPARATOR https://www.digitalsecurityforensics.org/digisecforensics/article/view/48 <p>The present study aims to identify and analyze the individualizing characteristics of documents printed using various inkjet printers through non-destructive examination with a Video Spectral Comparator (VSC-40). Printed samples were collected from twelve different inkjet printer models, primarily from the EPSON, HP, Canon, and Brother brands. Standardized A4 paper was used to ensure uniformity in analysis. Under VSC-40 magnification, several distinguishing features such as edge sharpness, dot roundedness, blooming effect, extraneous dots (satellite drops and overspray), directional artefacts, line defects, and banding patterns were systematically examined. The study observed that EPSON printers, utilizing piezoelectric technology, demonstrated superior edge sharpness and minimal blooming effects compared to other brands. Printers like Brother-DCP J140w exhibited pronounced blooming and banding defects. Features such as directional tailing and consistent line defects proved useful for determining the type of printing technology employed and for linking documents to their sources. The findings confirm that VSC-40 imaging provides a reliable, non-destructive means for the forensic differentiation of inkjet-printed documents, enhancing authenticity verification and source identification processes in questioned document examination.</p> Piyush Thakur Navjot Kaur Kanwal Shilpa Nair Parveen Kumar Janjua Copyright (c) 2025 Piyush Thakur, Navjot Kaur Kanwal, Shilpa Nair, Parveen Kumar Janjua https://creativecommons.org/licenses/by/4.0 2025-07-01 2025-07-01 2 2 1–10 1–10 10.29121/digisecforensics.v2.i2.2025.48 AN EVALUATION OF CYBER INCIDENT MANAGEMENT SYSTEMS IN HIGHER EDUCATION INSTITUTIONS (HEIS) IN KENYA https://www.digitalsecurityforensics.org/digisecforensics/article/view/50 <p>Kenyan universities are increasingly integrating digital technologies into their academic and administrative operations. However, this digital transformation has exposed institutions to escalating cybersecurity threats, including data breaches, ransomware attacks, and unauthorized access to critical information. This study evaluates the effectiveness of existing cybersecurity measures and incident management systems in Kenyan universities, aiming to identify key vulnerabilities and areas for improvement. A structured survey was conducted among IT personnel from four major Kenyan universities, gathering data on cybersecurity preparedness, existing frameworks, and incident response strategies. The findings indicate that while universities have implemented basic cybersecurity measures such as firewall protections and access controls, there are significant gaps in real-time threat detection, incident response preparedness, and cybersecurity training programs. Many institutions lack dedicated cybersecurity teams, and incident response mechanisms are largely reactive rather than proactive. Additionally, limited financial and technical resources hinder effective implementation of cybersecurity policies. This paper highlights critical deficiencies in cybersecurity frameworks currently in use and emphasizes the need for real-time monitoring systems, improved staff training, and the adoption of automated threat detection tools. The study recommends a multi-stakeholder approach involving universities, government agencies, and cybersecurity experts to enhance resilience against evolving cyber threats. Addressing these gaps will allow Kenyan universities can strengthen their cybersecurity posture, protect academic assets, and safeguard the privacy of students and faculty members. This research contributes to ongoing discussions on cybersecurity in higher education and provides a foundation for developing more effective cybersecurity policies and frameworks in African academic institutions.</p> Paul Okanda Abdijabar Abass Copyright (c) 2025 Paul Okanda, Abdijabar Abass https://creativecommons.org/licenses/by/4.0 2025-10-07 2025-10-07 2 2 11–37 11–37 10.29121/digisecforensics.v2.i2.2025.50