Il software “FAW – Forensics Acquisition of Websites” è stato sviluppato e viene tenuto aggiornato seguendo le indicazioni normative di standard internazionali in tema di acquisizione di dati informatici, è altresì conforme agli atri standard, in tema di Network Forensics e Cloud Forensics, affermati e riconosciuti dalla comunità tecnico-scientifica in ambito nazionale ed internazionale.

FAW è compliance con le seguenti normative e linee guida:

International Organization for Standardization, ISO/IEC 27037/2012: Information technology – Security techniques – Guidelines for identification, collection, acquisition and preservation of digital evidence;

IACIS, IFI Training Program, Internet Forensics and Investigation, 2015;

Sudhanshu Chauhan & Nutan Kumar Panda, Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Syngress – Elsevier, 225 Wyman Street, Waltham, MA 02451, USA, 2015;

Bill Nelson – Amelia Phillip – Christopher Steuart, Guide to Computer Forensics and Investigations, Fifth Edition, Cengage Learning, 2015;

Meyer, G., & Stander, A. (2015). Cloud computing: The digital forensics challenge. Proceedings of Informing Science & IT Education Conference (InSITE) 2015, 285- 299;

NIST Interagency Report 8006 NIST Cloud Computing Forensic Science Challenges, 2014;

Darren Quick – Ben Martini – Kim-Kwang Raymond Choo – Brett Shavers, Technical Editor, Cloud Storage Forensics, Syngress – Elsevier, 225 Wyman Street, Waltham, MA 02451, USA, 2014;

Todd G. Shipley & Art Bowker, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace, Syngress – Elsevier, 225 Wyman Street, Waltham, MA 02451, USA, 2014;

Barbara Endicott-Popovsky, ICCSM2014-Proceedings of the International Conference on Cloud Security, The cedars Univeristy of Reading, UK, 23-24 October 2014;

Gilbert Peterson & Sujeet Shenoi, Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised. In Information and Communication Technology, Springer Heidelberg NewYork Dordrecht London;

Ruan, Keyun, Cybercrime and Cloud Forensics: Applications for Investigation Processes, University College Dublin, Igi Global, 2013;

CSA (Cloud Security Alliance) “Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing” – June 2013;

CoE Electronic Evidence Guide, Data Protection and Cybercrime Division – Council of Europe, Strasbourg, France, 18 March 2013;

NIST Interagency Report 8006 NIST Cloud Computing Forensic Science Challenges, 2014;

International Conference On Forensic Computer Science (ICOFCS), Cloud Forensics. Best Practice And Challenges For Process Efficiency Of Investigations And Digital Forensics, Brasilia, Brazil, 2013;

IISFA Italian Chapter, IISFA Memberbook 2013 Digital Forensics: Condivisione della conoscenza tra i membri dell’IISFA Italian Chapter;

ACPO Good Practice Guide for Digital Evidence, Association of Chief Policy Officers, Version 5, 2012.

Harjinder Singh Lallie – Lee Pimlott, Challenges in applying the ACPO principles in cloud forensic investigations – Applying the ACPO Principles in Public Cloud Forensic Investigations, in Journal of Digital Forensics, Security and Law, Vol. 7 (1), 2012;

Sherri Davidoff – Jonathan Ham, Network Forensics Tracking Hackers through Cyberspace, Prentice Hall – Pearson Education, Westford, Massachusetts, 2012;

Josiah Dykstra-Alan T. Sherman, Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques, Digital Investigation 9 (2012) S90 – S98, Elsevier, 2012;

E.S.Pilli, R.C.Joshi, R.Niyogi, Digital Forensics and Cyber Crime – Proceedings of the 2nd international ICST Conference ICDF2C 2010 – “An IP Traceback Model for Network Forensics”, Springer, 2011;

Gilbert Peterson,Sujeet Shenoi, Advances in Digital Forensics VII – Proceedings of the VII IFIP WG international conference on Digital Forensics 2011 – “Cloud Forensics” (K.Ruan, J.Carthy, T.Kechadi, M. Crosbie), Addison-Wesley, Boston, Massachusetts, 2011;

Guide to Integrating Forensic Techniques into Incident Response – NIST Special Publication 800-86;

V. Roussev – L. Wang – G Richard – L. Marziale, A cloud computing platform for large-scale forensic computing, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, 2009;

RFC 3227 – Guidelines for Evidence Collection and Archiving, 2002;

Legge 48 del 18 marzo 2008 “Ratifica ed esecuzione della Convenzione del Consiglio d’Europa sulla criminalità informatica, fatta a Budapest il 23 novembre 2001”;

Convenzione di Budapest sulla criminalità informatica – Consiglio d’Europa – 23 novembre 2001.