Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness

被引:2
|
作者
Ul Haque, Ehtisham [1 ]
Abbasi, Waseem [2 ]
Murugesan, Sathishkumar [3 ]
Anwar, Muhammad Shahid [4 ]
Khan, Faheem [5 ]
Lee, Youngmoon [6 ]
机构
[1] Muslim Youth Univ, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Super Univ, Dept Comp Sci & IT, Sargodha 40100, Pakistan
[3] Natl Cheng Kung Univ, Dept Mech Engn, Tainan 70101, Taiwan
[4] Gachon Univ, Dept AI & Software, Seongnam Si 13120, South Korea
[5] Gachon Univ, Dept Comp Engn, Seongnam Si 13120, South Korea
[6] Hanyang Univ, Dept Robot, Ansan 15588, South Korea
基金
新加坡国家研究基金会;
关键词
Digital forensics; Law enforcement; Cyberattack; Guidelines; NIST; Training; Software engineering; Cyber forensics; cyber forensic investigation; cyber landscape; cybersecurity; digital evidence; digital forensics; e-crime; incident response; MODEL;
D O I
10.1109/ACCESS.2023.3268529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rapid growth in technological criminal activities has drawn worldwide attention to cyber forensics. The objective of a cyber forensics is to provide situation awareness in terms of identification and preservation of digital evidence, extraction of information, and analysis of extracted information to facilitate time-critical decision making. However, Cyber Forensic Investigations (CFIs) still lack significant structure to provide reliable insight into major cyberattack patterns. Data from the Global Cyber Security Index (GCI) show that Pakistan lags far behind in technological and organizational initiatives, posing a threat to its national security. This article focuses on state coordinated CFI infrastructure to mitigate the occurrence of cybercrime challenges. Moreover, a conceptual model is established to address the infrastructure of CFI using policy approach, legal, technical, organizational, capacity building, and cooperative venture. This conceptual model is structured in pillars to simplify the CFI infrastructure. The goal of the study is to provide an empirical foundation for policymakers to develop a comprehensive framework for CFI in the country, and to offer insights and recommendations for improving the infrastructure to better combat cybercrime in Pakistan.
引用
收藏
页码:40049 / 40063
页数:15
相关论文
共 46 条
  • [21] Mathematical Modeling and Clustering Framework for Cyber Threat Analysis Across Industries
    Sufi, Fahim
    Alsulami, Musleh
    MATHEMATICS, 2025, 13 (04)
  • [22] Cyber Crime Trend in Bangladesh, an Analysis and Ways Out to Combat the Threat
    Kundu, Shusmoy
    Islam, Khandaker Annatoma
    Jui, Tania Tahmina
    Rafi, Suzzana
    Hossain, Md. Afzal
    Chowdhury, Ishraq Haider
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 474 - 480
  • [23] Unraveling the dynamics of the cyber threat landscape: Major shifts examined through the recent societal events
    Song, Uihyeon
    Hur, Gimin
    Lee, Sangjin
    Park, Jungheum
    SUSTAINABLE CITIES AND SOCIETY, 2024, 103
  • [24] Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber Capabilities
    Yang, Jeong Yoon
    Kim, So Jeong
    Oh, Il Seok
    INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 102 - 111
  • [25] Designing Comprehensive Cyber Threat Analysis Platform: Can We Orchestrate Analysis Engines?
    Takahashi, Takeshi
    Umemura, Yuki
    Han, Chansu
    Ban, Tao
    Furumoto, Keisuke
    Nakamura, Ohnori
    Yoshioka, Katsunari
    Takeuchi, Junichi
    Murata, Noboru
    Shiraishi, Yoshiaki
    2021 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2021, : 376 - 379
  • [26] Exploring the Cyber-Physical Threat Landscape of Water Systems: A Socio-Technical Modelling Approach
    Moraitis, Georgios
    Sakki, Georgia-Konstantina
    Karavokiros, George
    Nikolopoulos, Dionysios
    Tsoukalas, Ioannis
    Kossieris, Panagiotis
    Makropoulos, Christos
    WATER, 2023, 15 (09)
  • [27] Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text
    Jo, Hyeonseong
    Lee, Yongjae
    Shin, Seungwon
    COMPUTERS & SECURITY, 2022, 120
  • [28] A Conceptual Model for Data-Driven Threat Analysis for Enhancing Cyber Security
    Alwaheidi, Mohammed K. S.
    Islam, Shareeful
    Papastergiou, Spyridon
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INNOVATIONS IN COMPUTING RESEARCH (ICR'22), 2022, 1431 : 365 - 374
  • [29] System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis
    Fagade, Tesleem
    Spyridopoulos, Theo
    Albishry, Nabeel
    Tryfonas, Theo
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 309 - 321
  • [30] Analysis and Evaluation of Cyber-attack Impact on Critical Power System Infrastructure
    Singh, Neeraj Kumar
    Mahajan, Vasundhara
    SMART SCIENCE, 2021, 9 (01) : 1 - 13