Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness

被引:1
|
作者
Ul Haque, Ehtisham [1 ]
Abbasi, Waseem [2 ]
Murugesan, Sathishkumar [3 ]
Anwar, Muhammad Shahid [4 ]
Khan, Faheem [5 ]
Lee, Youngmoon [6 ]
机构
[1] Muslim Youth Univ, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Super Univ, Dept Comp Sci & IT, Sargodha 40100, Pakistan
[3] Natl Cheng Kung Univ, Dept Mech Engn, Tainan 70101, Taiwan
[4] Gachon Univ, Dept AI & Software, Seongnam Si 13120, South Korea
[5] Gachon Univ, Dept Comp Engn, Seongnam Si 13120, South Korea
[6] Hanyang Univ, Dept Robot, Ansan 15588, South Korea
基金
新加坡国家研究基金会;
关键词
Digital forensics; Law enforcement; Cyberattack; Guidelines; NIST; Training; Software engineering; Cyber forensics; cyber forensic investigation; cyber landscape; cybersecurity; digital evidence; digital forensics; e-crime; incident response; MODEL;
D O I
10.1109/ACCESS.2023.3268529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rapid growth in technological criminal activities has drawn worldwide attention to cyber forensics. The objective of a cyber forensics is to provide situation awareness in terms of identification and preservation of digital evidence, extraction of information, and analysis of extracted information to facilitate time-critical decision making. However, Cyber Forensic Investigations (CFIs) still lack significant structure to provide reliable insight into major cyberattack patterns. Data from the Global Cyber Security Index (GCI) show that Pakistan lags far behind in technological and organizational initiatives, posing a threat to its national security. This article focuses on state coordinated CFI infrastructure to mitigate the occurrence of cybercrime challenges. Moreover, a conceptual model is established to address the infrastructure of CFI using policy approach, legal, technical, organizational, capacity building, and cooperative venture. This conceptual model is structured in pillars to simplify the CFI infrastructure. The goal of the study is to provide an empirical foundation for policymakers to develop a comprehensive framework for CFI in the country, and to offer insights and recommendations for improving the infrastructure to better combat cybercrime in Pakistan.
引用
收藏
页码:40049 / 40063
页数:15
相关论文
共 50 条
  • [31] A Cyber-Physical Threat Analysis for Microgrids
    Rekik, Mouna
    Chtourou, Zied
    Gransart, Christophe
    Atieh, Ahmad
    2018 15TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES (SSD), 2018, : 731 - 737
  • [32] A Cyber-ITS Framework for Massive Traffic Data Analysis Using Cyber Infrastructure
    Xia, Yingjie
    Hu, Jia
    Fontaine, Michael D.
    SCIENTIFIC WORLD JOURNAL, 2013,
  • [33] Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems
    AboulEla, Samar
    Ibrahim, Nourhan
    Shehmir, Sarama
    Yadav, Aman
    Kashef, Rasha
    AI, 2024, 5 (02) : 704 - 732
  • [34] Human Performance Factors in Cyber Security Forensic Analysis
    McClain, Jonathan
    Silva, Austin
    Emmanuel, Glory
    Anderson, Benjamin
    Nauer, Kevin
    Abbott, Robert
    Forsythe, Chris
    6TH INTERNATIONAL CONFERENCE ON APPLIED HUMAN FACTORS AND ERGONOMICS (AHFE 2015) AND THE AFFILIATED CONFERENCES, AHFE 2015, 2015, 3 : 5301 - 5307
  • [35] Social Process for Cyber-Threat Analysis (SPCTA)
    Brown, Harry, III
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 441 - 449
  • [36] Preventing unauthorized islanding: Cyber-threat analysis
    Simmons, Sharon
    Edwards, Dennis
    Wilde, Norman
    Just, Jiri
    Satyanarayana, Mahidhar
    PROCEEDINGS OF THE 2006 IEEE/SMC INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING, 2006, : 178 - +
  • [37] Service-Oriented Modeling for Cyber Threat Analysis
    Leune, Kees
    Kim, Sung
    PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, : 150 - 152
  • [38] Longitudinal analysis of a large corpus of cyber threat descriptions
    Mezzour, Ghita
    Carley, L. Richard
    Carley, Kathleen M.
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2016, 12 (01): : 11 - 22
  • [39] Threat Analysis of Cyber Attacks with Attack Tree+
    Wang, Ping (pingwang@mail.ksu.edu.tw), 1600, Ubiquitous International (05):
  • [40] Threat Analysis and Risk Assessment in Automotive Cyber Security
    Ward, David
    Ibarra, Ireri
    Ruddle, Alastair
    SAE INTERNATIONAL JOURNAL OF PASSENGER CARS-ELECTRONIC AND ELECTRICAL SYSTEMS, 2013, 6 (02): : 507 - 513