Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness

被引:2
作者
Ul Haque, Ehtisham [1 ]
Abbasi, Waseem [2 ]
Murugesan, Sathishkumar [3 ]
Anwar, Muhammad Shahid [4 ]
Khan, Faheem [5 ]
Lee, Youngmoon [6 ]
机构
[1] Muslim Youth Univ, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Super Univ, Dept Comp Sci & IT, Sargodha 40100, Pakistan
[3] Natl Cheng Kung Univ, Dept Mech Engn, Tainan 70101, Taiwan
[4] Gachon Univ, Dept AI & Software, Seongnam Si 13120, South Korea
[5] Gachon Univ, Dept Comp Engn, Seongnam Si 13120, South Korea
[6] Hanyang Univ, Dept Robot, Ansan 15588, South Korea
基金
新加坡国家研究基金会;
关键词
Digital forensics; Law enforcement; Cyberattack; Guidelines; NIST; Training; Software engineering; Cyber forensics; cyber forensic investigation; cyber landscape; cybersecurity; digital evidence; digital forensics; e-crime; incident response; MODEL;
D O I
10.1109/ACCESS.2023.3268529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rapid growth in technological criminal activities has drawn worldwide attention to cyber forensics. The objective of a cyber forensics is to provide situation awareness in terms of identification and preservation of digital evidence, extraction of information, and analysis of extracted information to facilitate time-critical decision making. However, Cyber Forensic Investigations (CFIs) still lack significant structure to provide reliable insight into major cyberattack patterns. Data from the Global Cyber Security Index (GCI) show that Pakistan lags far behind in technological and organizational initiatives, posing a threat to its national security. This article focuses on state coordinated CFI infrastructure to mitigate the occurrence of cybercrime challenges. Moreover, a conceptual model is established to address the infrastructure of CFI using policy approach, legal, technical, organizational, capacity building, and cooperative venture. This conceptual model is structured in pillars to simplify the CFI infrastructure. The goal of the study is to provide an empirical foundation for policymakers to develop a comprehensive framework for CFI in the country, and to offer insights and recommendations for improving the infrastructure to better combat cybercrime in Pakistan.
引用
收藏
页码:40049 / 40063
页数:15
相关论文
共 46 条
  • [31] MISSION-BASED ANALYSIS FOR ASSESSING CYBER RISK IN CRITICAL INFRASTRUCTURE SYSTEMS
    Llanso, Thomas
    Tally, Gregg
    Silberglitt, Michael
    Anderson, Tara
    CRITICAL INFRASTRUCTURE PROTECTION VII, 2013, 417 : 201 - 214
  • [32] An Analysis of Smart Grid Communication Infrastructure & Cyber Security in Smart Grid.
    Jahan, Sharmin
    Habiba, Rabeya
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL ENGINEERING (ICAEE), 2015, : 190 - 193
  • [33] Cyber Threat Impact Analysis to Air Traffic Flows Through Dynamic Queue Networks
    Tamimi, Ali
    Hahn, Adam
    Roy, Sandip
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2020, 4 (03)
  • [34] Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems
    Zimba, Aaron
    Wang, Zhaoshun
    Chen, Hongsong
    ICT EXPRESS, 2018, 4 (01): : 14 - 18
  • [35] Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies
    Pate-Cornell, M. -Elisabeth
    Kuypers, Marshall
    Smith, Matthew
    Keller, Philip
    RISK ANALYSIS, 2018, 38 (02) : 226 - 241
  • [36] Potential cyber-threats against Canada's critical infrastructure: an investigation of online discussion forums
    Warkentin, Noelle
    Frank, Richard
    Zhang, Yuxuan
    Zakimi, Naomi
    CRIMINAL JUSTICE STUDIES, 2022, 35 (03) : 322 - 345
  • [37] Intelligent Threat Detection-AI-Driven Analysis of Honeypot Data to Counter Cyber Threats
    Lanka, Phani
    Gupta, Khushi
    Varol, Cihan
    ELECTRONICS, 2024, 13 (13)
  • [38] Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures
    Thapaliya, Suman
    Sharma, Pawan Kumar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2023, 17 (01)
  • [39] Accessible from the open web: a qualitative analysis of the available open-source information involving cyber security and critical infrastructure
    Zhang, Yuxuan
    Frank, Richard
    Warkentin, Noelle
    Zakimi, Naomi
    JOURNAL OF CYBERSECURITY, 2022, 8 (01):
  • [40] Supporting features for flow-level packet analysis towards cyber threat detection: A pilot study
    Ogu E.C.
    Ojesanmi O.A.
    Awodele O.
    Kuyoro S.O.
    International Journal of Information and Computer Security, 2021, 16 (1-2) : 137 - 149