Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes

Full Text (PDF, 711KB), PP.16-24

Views: 0 Downloads: 0


Rabail S. Satti 1,* Fakeeha Jafari 2

1. Fatima Jinnah Women University/Department of Software Engineering, Rawalpindi, 46000, Pakistan

2. Fatima Jinnah Women University/Department of Computer Science, Rawalpindi, 46000, Pakistan

* Corresponding author.


Received: 15 Sep. 2014 / Revised: 20 Nov. 2014 / Accepted: 6 Jan. 2015 / Published: 8 Apr. 2015

Index Terms

Cyber forensics investigation, Cyber forensics investigation process models, Domain Specific, Comparative analysis, Law compliance


Digital Forensics can be defined as a field of study involving the usage of technical and proved procedures for collecting, preserving, validating, analyzing, interpreting and presenting the Evidences extracted from the digital sources for presenting those in the court of law. Different process models have been proposed by the researchers for cyber crimes’ investigation process, each having its own suitability to environments where they are applicable and other pros and cons. The paper includes the tailoring of existing process models to the particular domain of higher education institutes. With the growing access of computing resources and internet to the students, employees and overall citizens, it is the need of time that organizations should establish and maintain their cyber forensics analysis policy along with whole process to be followed in case of any cyber crime scene reporting.

Cite This Paper

Rabail S. Satti, Fakeeha Jafari, "Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes", International Journal of Computer Network and Information Security(IJCNIS), vol.7, no.5, pp.16-24, 2015. DOI:10.5815/ijcnis.2015.05.03


[1]W. G. Kruse and J. G. Heiser, “Computer Forensics: Incident Response Essentials” 1st edition, Addison Wesley, 2002.
[2]M. Reith, C. Carr, G. Gunsch, “An Examination of Digital Forensic Models” IJDE, vol. 1, issue 3, 2002.
[3]Technical working group electronic crime scene investigation, “A Guide for First Responders”, USDOJ, July 2001
[4]G. L. Palmer, Technical report DTR-T0010-01 “A Roadmap for Digital Forensic Research,” DFRWS, Utica, New York 2001
[5]A. Agarwal, M. Gupta, S. Gupta and S.C. Gupta, “Systematic Digital Forensic Investigation Model,” IJCSS, vol. 5, issue 1, pp.118-131, 2011.
[6]B. Yunus, Y, Roslan I & Zainuddin, H, “Common Phases of Computer Forensics Investigation Models”, International Journal of Computer Science & Information Technology (IJCSIT), Vol. 3, No 3, June 2011
[7]M.D. Kohn, M.M. Eloff, J.H.P. Eloff, “Integrated digital forensic process model”, Computers & Security, vol. 38, pp. 103-115, October 2013.
[8]K.Rogers, M., Goldman, J., Mislan, R., Wedge, T., & Debrota, S., “Computer Forensics Field Triage Process Model”, Journal of Digital Forensics, Security and Law, Vol. 1 (2), 2006
[9]P. Sundresan, “Digital Forensic Model based on Malaysian Investigation Process”, International Journal of Computer Science and Network Security, Vol. 9, No. 8, 2009
[10]V. Baryamureeba, F. Tushabe, “The Enhanced Digital Investigation Process Model”, Asian Journal of Information Technology, Volume 5, Issue 7, 2006
[11]E. Casey, G. Katz, and J. Lewthwaite, "Honing digital forensic processes", Digital Investigation, 2013, pp.138-147..
[12]G. Ruibin, C. H. K. Yun, Tony, M. Gaertner, “Case-Relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic Framework”, IJDE, vol. 4, issue 1, 2005.
[13]S. R. Selamat, R. Yusof, and S. Sahib, “Mapping Process of Digital Forensic Investigation Framework”, IJCSNS, vol. 8, issue 10, pp. 163-169, October 2008.