International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Digital Forensic Models: A Comparative Study based in large enterprises of Pakistan

Author Affiliations

  • 1 Federal Urdu University of Arts, Science and Technology, Karachi, PAKISTAN
  • 2Mohammad Ali Jinnah University, Karachi, PAKISTAN
  • 3KICT, International Islamic University Malaysia, Jalan Gombak, 53100 Kuala Lumpur, Selangor, MALAYSIA

Res. J. Recent Sci., Volume 3, Issue (8), Pages 103-110, August,2 (2014)

Abstract

Introduction of Information Technology in the business has not only improved the performance and has opened new doors for the market; contemporarily it has transformed the dependency of large enterprises more towards the efficiency and reliability of this technology. Cyber crime is a type of crime associated with I.T which could not just affect the performance of these organizations but also may ruin their business, reputation and trust in the market. Apart from different security measures to protect these organizations from cyber attacks, Digital forensic is the science which was introduced to find out the culprits once any crime occurs successfully. Digital forensic examiners perform investigation process and collect the evidences which may be admissible in the court of law so that the offender gets penalized and the affected organization restores their financial loss and prevents it to happen again in future. Different modules were introduced since 2001 to 2011 around the globe which divide the digital forensic investigation process into different phases. Because of lack of awareness and slow adopting nature of Pakistan, this science is not being familiarized as much and no any particular module is followed by cyber forensic firms because organizations of Pakistan donít tend to opt for such services with some reservations. In this paper we have identified vulnerable sections in 80 large enterprises of Pakistan in the context of their security measures taken to enable successful digital forensic investigation process. These 80 organizations contained different types of industries, banks, and hospitalsetc where the I.T is used at quite some extent and as reliable tool for their core business.

References

  1. Muhammad Asif Khan and Hussein Zedan, Alignment Strategies and Frameworks in Co-Evolution of Business and Information Technology, International Conference on Information, Networking and Automation (ICINA), IEEE,2010)
  2. Mafaza Sajid and Sarah Mansoor, Usability Testing of Wikiís, Research Journal of Computer and Information Technology Science ISCA, 1(5), 1-7 (2013)
  3. Patil Swati P.1, Pawar B.V.2 and Patil Ajay S., Search Engine Optimization: A Study, Research Journal of Computer and Information Technology Sciences, ISCA, 1(1), 10-13, (2013)
  4. Abirami Sivaprasad and Smita JangaJe, A Complete Study on Tools and Techniques for Digital Forensic Analysis, International Conference on Computing, Electronics and Electrical Technologies ICCEET, IEEE, (2012)
  5. P. Salini and S. Kanmani, A Model based Security Requirements Engineering Framework applied for Online Trading System, IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011, 978-1- 4577-0590-8/11/$26.00 ©2011 IEEE, MIT, Anna University, Chennai, (2011)
  6. Narmeen Bawany, Rabia Ahmedand Qanita Zakir, Common Biometric Authentication Techniques: Comparative Analysis, Usability and Possible Issues Evaluation, Research Journal of Computer and Information Technology Science, 1(4), 5-14, (2013)
  7. Lakshmi P.S., Pasha Sajid and Ramana M.V, Security and Energy efficiency in Ad Hoc Networks, Research Journal of Computer and Information Technology Sciences, ISCA, 1(1), 14-17 (2013)
  8. Social Networking: Its Uses and Abuses, Research Journal of Computer and Information Technology Sciences, 1(1), 14-17 (2013)
  9. Robert J. Walls, Brian Neil Levine, Marc Liberatoreand Clay Shields, Effective Digital Forensics Research is Investigator-Centric, (2012)
  10. Slim Rekhis and Noureddine Boudriga, Formal Digital Investigation of Anti-forensic Attacks, Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering, IEEE, (2010)
  11. Peter Stephenson and Richard Walter, Cyber Crime Assessment, 45th Hawaii International Conference on System Sciences, IEEE, (2012)
  12. Simson L. Garfinkel, Digital forensics research: The next 10 years, Digital Forensic Research Workshop, Published by Elsevier Ltd, (2010)
  13. Aleksandar Valjarevic and Hein S. Venter, Harmonized Digital Forensic Investigation Process Model, IEEE, (2012)
  14. Kara Nance, Brian Hay and Matt Bishop, Digital Forensics: Defining a Research Agenda, Proceedings of the 42nd Hawaii International Conference on System Sciences, IEEE, (2009)
  15. Ayaz Khan, Uffe Kock Wiil and Nasrullah Memon, Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level, Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering, IEEE, (2010)
  16. Mr. Ankit Agarwal, Ms Megha Gupta, Mr. Saurabh Gupta and Prof. (Dr.) Subhash Chandra Gupta,Systematic Digital Forensic Investigation Model, International Journal of Computer Science and Security (IJCSS), 5(1), (2011)
  17. President signs fair trial act into law, http://pakistantoday.com.pk/2013/02/20/news/national/ president-signs-fair-trial-act-into-law/ [Access : 04-02-2013] (2013)
  18. Cyber Crime Law in Pakistan, http://cyber-crime-law.com/2013/03/17/cyber-crime-law-pakistan/ [Access: 02-10-2013] (2013)