blog




  • Essay / Standardization of computer forensics through laws and...

    Summary– Technological advances in computing have opened new horizons for human progress while creating new criminal opportunities. These cyber crimes are difficult to manage due to their rapid growth and transnational reach. It requires a two-pronged strategy that includes procedural and legal improvements. Considering the need to standardize IT forensic processes, a comprehensive framework is proposed in this research. This will allow investigators to submit evidence acceptable to the court. All countries in the world must have a strong legislative shield that will serve as a basis for the computer investigation process. The legal system must cover criminal and procedural laws as well as international treaties and transnational agreements. To this end, a comprehensive and flexible legislative network is proposed in this research. Cybercrimes against people, businesses, the state or morality need a “legislative web” across the world. Validation of procedural and legal frameworks is done through land laws in Pakistan and international treaties. It is necessary to launch legislative and technological offenses against computer crimes which are extremely dangerous in nature.1. IntroductionIn today's modern era, computer technology has a significant impact on all aspects of daily life of human beings. Criminals have cast their complex and widespread web on computer technology. In order to combat these crimes and prevent them in the future, the main goal of computer forensics is to obtain legally acceptable evidence. The term “computer forensics” was used as early as 1991 during the first training session organized by the International Association of Computer Scientists (IACIS). For...... middle of article ......onino, "Electronic proof and Computer Forensics", Communications of AIS, Volume 12, Article 27, October 2003[15] Kenneth C. Brancik, "The Computer Forensics and Cybersecurity Governance Model", Information Systems Control Journal, Volume 2, 2003[16] Mark Reith, Clint Carr, Gregg Gunsch, “An Examination of Digital Forensic Models”, International Journal of Digital Evidence, Volume 1, Number 3, Fall 2002[17] Eoghan Casey, “Error, Uncertainty, and Loss in Digital Evidence”, International Journal of Digital Evidence, Volume 1, Issue 2, Summer 2002[18] Alec Yasinsac, “Policy to Enhance Computer and Network Forensics”, Workshop on Information Assurance and Security, IEEE, 2001[19] Michael G Noblett, Mark M. Pollitt, Lawrence A. Presley, “Recovery and Examination of Forensic Computer Evidence,” Forensic Science communications, Volume 2, Number 4, October. 2000