Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness

被引:2
作者
Ul Haque, Ehtisham [1 ]
Abbasi, Waseem [2 ]
Murugesan, Sathishkumar [3 ]
Anwar, Muhammad Shahid [4 ]
Khan, Faheem [5 ]
Lee, Youngmoon [6 ]
机构
[1] Muslim Youth Univ, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Super Univ, Dept Comp Sci & IT, Sargodha 40100, Pakistan
[3] Natl Cheng Kung Univ, Dept Mech Engn, Tainan 70101, Taiwan
[4] Gachon Univ, Dept AI & Software, Seongnam Si 13120, South Korea
[5] Gachon Univ, Dept Comp Engn, Seongnam Si 13120, South Korea
[6] Hanyang Univ, Dept Robot, Ansan 15588, South Korea
基金
新加坡国家研究基金会;
关键词
Digital forensics; Law enforcement; Cyberattack; Guidelines; NIST; Training; Software engineering; Cyber forensics; cyber forensic investigation; cyber landscape; cybersecurity; digital evidence; digital forensics; e-crime; incident response; MODEL;
D O I
10.1109/ACCESS.2023.3268529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rapid growth in technological criminal activities has drawn worldwide attention to cyber forensics. The objective of a cyber forensics is to provide situation awareness in terms of identification and preservation of digital evidence, extraction of information, and analysis of extracted information to facilitate time-critical decision making. However, Cyber Forensic Investigations (CFIs) still lack significant structure to provide reliable insight into major cyberattack patterns. Data from the Global Cyber Security Index (GCI) show that Pakistan lags far behind in technological and organizational initiatives, posing a threat to its national security. This article focuses on state coordinated CFI infrastructure to mitigate the occurrence of cybercrime challenges. Moreover, a conceptual model is established to address the infrastructure of CFI using policy approach, legal, technical, organizational, capacity building, and cooperative venture. This conceptual model is structured in pillars to simplify the CFI infrastructure. The goal of the study is to provide an empirical foundation for policymakers to develop a comprehensive framework for CFI in the country, and to offer insights and recommendations for improving the infrastructure to better combat cybercrime in Pakistan.
引用
收藏
页码:40049 / 40063
页数:15
相关论文
共 46 条
  • [41] UNECE Threat List Case Study: Prediction of Cyber Risks in the Automotive Domain Using Regression Analysis
    Shaaban, Abdelkader Magdy
    Chlup, Sebastian
    Schmittner, Christoph
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2022 WORKSHOPS, 2022, 13415 : 110 - 122
  • [42] PROTECTING THE FUTURE OF CLEAN AND DISTRIBUTED ENERGY TECHNOLOGIES THROUGH COLLABORATIVE CYBER THREAT ANALYSIS AND INFORMATION SHARING
    Harkness D.
    Pinkerton S.
    International Journal of Energy for a Clean Environment, 2023, 24 (08) : 29 - 37
  • [43] Applying RNN and J48 Deep Learning in Android Cyber Security Space for Threat Analysis
    Teoh, T. T.
    Chiew, Graeme
    Jaddoo, Yeaz
    Michael, H.
    Karunakaran, A.
    Goh, Y. J.
    2018 INTERNATIONAL CONFERENCE ON SMART COMPUTING AND ELECTRONIC ENTERPRISE (ICSCEE), 2018,
  • [44] 'Cyber Gurus': A rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure protection
    Quigley, Kevin
    Burns, Calvin
    Stallard, Kristen
    GOVERNMENT INFORMATION QUARTERLY, 2015, 32 (02) : 108 - 117
  • [45] Ontology-Driven Cyber-Security Threat Assessment Based on Sentiment Analysis of Network Activity Data
    Lundquist, Doug
    Zhang, Kunpeng
    Ouksel, Aris
    2014 INTERNATIONAL CONFERENCE ON CLOUD AND AUTONOMIC COMPUTING (ICCAC 2014), 2014, : 5 - 14
  • [46] An Enhanced Energy Management System Including a Real-Time Load-Redistribution Threat Analysis Tool and Cyber-Physical SCED
    Kaviani, Ramin
    Hedman, Kory W.
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2022, 37 (05) : 3346 - 3358