Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness

被引:1
|
作者
Ul Haque, Ehtisham [1 ]
Abbasi, Waseem [2 ]
Murugesan, Sathishkumar [3 ]
Anwar, Muhammad Shahid [4 ]
Khan, Faheem [5 ]
Lee, Youngmoon [6 ]
机构
[1] Muslim Youth Univ, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Super Univ, Dept Comp Sci & IT, Sargodha 40100, Pakistan
[3] Natl Cheng Kung Univ, Dept Mech Engn, Tainan 70101, Taiwan
[4] Gachon Univ, Dept AI & Software, Seongnam Si 13120, South Korea
[5] Gachon Univ, Dept Comp Engn, Seongnam Si 13120, South Korea
[6] Hanyang Univ, Dept Robot, Ansan 15588, South Korea
基金
新加坡国家研究基金会;
关键词
Digital forensics; Law enforcement; Cyberattack; Guidelines; NIST; Training; Software engineering; Cyber forensics; cyber forensic investigation; cyber landscape; cybersecurity; digital evidence; digital forensics; e-crime; incident response; MODEL;
D O I
10.1109/ACCESS.2023.3268529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rapid growth in technological criminal activities has drawn worldwide attention to cyber forensics. The objective of a cyber forensics is to provide situation awareness in terms of identification and preservation of digital evidence, extraction of information, and analysis of extracted information to facilitate time-critical decision making. However, Cyber Forensic Investigations (CFIs) still lack significant structure to provide reliable insight into major cyberattack patterns. Data from the Global Cyber Security Index (GCI) show that Pakistan lags far behind in technological and organizational initiatives, posing a threat to its national security. This article focuses on state coordinated CFI infrastructure to mitigate the occurrence of cybercrime challenges. Moreover, a conceptual model is established to address the infrastructure of CFI using policy approach, legal, technical, organizational, capacity building, and cooperative venture. This conceptual model is structured in pillars to simplify the CFI infrastructure. The goal of the study is to provide an empirical foundation for policymakers to develop a comprehensive framework for CFI in the country, and to offer insights and recommendations for improving the infrastructure to better combat cybercrime in Pakistan.
引用
收藏
页码:40049 / 40063
页数:15
相关论文
共 50 条
  • [1] Cyber Threat Landscape in Cyber Space
    Shanker, Anusha Kadambari
    Usha, G.
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 375 - 380
  • [2] The cyber threat landscape
    Sutton, Martin
    Journal of the Institute of Telecommunications Professionals, 2020, 14 : 30 - 35
  • [3] Forensic Investigation Processes for Cyber Crime and Cyber Space
    Sindhu, K. K.
    Kombade, Rupali
    Gadge, Reena
    Meshram, B. B.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 : 193 - 206
  • [4] Cyber Threat Landscape in Energy Sector
    Kovanen, Tiina
    Nuojua, Viivi
    Lehto, Martti
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 353 - 361
  • [5] Critical Infrastructure Cyber Threat - A Case Study
    Wangdi, Y.
    Veal, D.
    Maj, S. P.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 20 - 23
  • [6] Cyber threat intelligence for critical infrastructure security
    Osliak, Oleksii
    Saracino, Andrea
    Martinelli, Fabio
    Mori, Paolo
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23):
  • [7] Cyber Technological Paradigms and Threat Landscape in India
    Patil, Krutika
    STRATEGIC ANALYSIS, 2022, 46 (03) : 354 - 356
  • [8] Cyber Technological Paradigms and Threat Landscape in India
    Bhangoo, Har Sandeep Kaur
    MILLENNIAL ASIA, 2022, 13 (03) : 532 - 535
  • [10] A Cyber Forensic Taxonomy for SCADA Systems in Critical Infrastructure
    Eden, Peter
    Blyth, Andrew
    Burnap, Pete
    Cherdantseva, Yulia
    Jones, Kevin
    Soulsby, Hugh
    Stoddart, Kristan
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2015, 2016, 9578 : 27 - 39