Topic > Standardization of computer forensics across law firms and…

Abstract– Technological advancement in computer technology has opened new horizons for human progress as well as creating new criminal opportunities. These cybercrimes are difficult to manage due to their rapid growth and transnational reach. A two-pronged strategy is needed, including procedural and legal improvements. Keeping in mind the need for standardization in computer forensic processes, a comprehensive framework is suggested in this research. This will allow investigators to present acceptable evidence in court. All countries in the world must have a strong legislative shield that will serve as the basis for the computer forensics process. The legal system must cover criminal and procedural laws together with international treaties and transnational agreements. To this end, this research suggests a complete and flexible legislative network. Cybercrimes against people, companies, the state or morality require a worldwide “legislative web”. Validation of both procedural and legal frameworks is done through land laws in Pakistan and international treaties. It is necessary to launch a legislative and technological offensive against cyber crimes which are of a seriously dangerous nature.1. Introduction In the current modern era, computer technology has a strong impact on every aspect of human daily life. Criminals have cast their complex and widespread web on computer technology. To deal with these crimes and prevent them in the future, the main goal of computer forensics is to provide legally acceptable evidence. The term “Computer Forensics” was used already in 1991 in the first training session organized by the international association of computer specialists (IACIS). For...... half of the document ......onino, “Electronic proof and computer forensics,” Communications of the AIS, Volume12, Article 27, October 2003[15] Kenneth C. Brancik,” The Computer Forensics and Cybersecurity Governance Model,” Information Systems Control Journal, Volume 2, 2003[16] Mark Reith, Clint Carr, Gregg Gunsch, “An Examination of Digital Forensic Models”, International Journal of Digital Evidence, Volume 1, Issue 3, Fall 2002[17] Eoghan Casey, “Error, Uncertainty, and Loss in Digital Evidence”, International Journal of Digital Evidence, Volume 1, Number 2, Summer 2002[18] Alec Yasinsac, ”Policies to Enhance Computer and Network Forensics”, Workshop on Information Assurance and Security, IEEE, 2001[19] Michael G. Noblett, Mark M. Pollitt, Lawrence A. Presley, “Recovering and Examining Computer Forensic Evidence”, Forensic Science communications, Volume 2, Number 4, October 2000