Nothing Special   »   [go: up one dir, main page]

Skip to main content

The Framework of e-Forensics in the Republic of Croatia

  • Conference paper
Digital Information Processing and Communications (ICDIPC 2011)

Abstract

With the development of information communication systems and the services they provide, the complexity of the organization of information within information systems is growing. The complexity itself contributes to the increase in the number of electronic incidents and affects the high demands of forensic procedure implementation. It is estimated that in the near future the number of electronic incidents will outgrow the number of classical criminal incidents both financially and quantitatively. Due to the things mentioned above, early identification, discovering and taking legal proceedings against the perpetrator of an electronic incident are necessary. It is necessary to investigate all electronic incidents adequately and promptly and adapt the legal framework and laws related to e-Forensics. e-Forensics is a relatively new discipline within which there is a low level of standardization and consistency. With the purpose of increasing the quality of performing e-Forensics and presenting the evidence in a possible judicial proceeding one has to define the legal framework of e-Forensics. The analysis of current legal standards and methods used to perform e-Forensics is presented in the paper as well as the proposal of performing e-Forensics with defined procedures and methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wall, C., Paroff, J.: Cracking the Computer Forensics Mystery. Utah Bar Journal 17(4), 10–14 (2004)

    Google Scholar 

  2. Carrier, B.: File System Forensic Analysis, 1st edn. Addison-Wesley Professional, Reading (2005)

    Google Scholar 

  3. Bidgoli, H.: Handbook of Information Security, 1st edn. Wiley, Chichester (2006)

    Google Scholar 

  4. Reith, M., Carr, C., Gunsch, G.: An Examination of Digital Forensic Models. International Journal of Digital Evidence 1(3), 1–12 (2002)

    Google Scholar 

  5. Volonino, L.: Electronic Evidence and Coputer Forensics. Communications o f374 V. Remenar, D. Peraković, and G. Zovak AIS 12, 1-23 (October 2003)

    Google Scholar 

  6. Taylor, M., Haggerty, J., Gresty, D.: The Legal Aspects of Corporate Computer Forensic Investigations. Computer Law & Security Report 23, 562–566 (2007)

    Article  Google Scholar 

  7. Schwerha, J.: Cybercrime: Legal Standar ds Governing the Collection of DigitlEvidence. Information Systems Frontiers 6(2), 133–151 (2004)

    Article  Google Scholar 

  8. Meyers, M., Rogers, M.: Computer Forensics: The Need for Standardization and Certification. International Journal of Digital Evidence 3(2), 1–11 (Fall 2004)

    Google Scholar 

  9. Legiland, R., Krings, A.: A Formalization of Digital Forensics. International Journal of Digital Evidence 3(2), 1–31 (Fall 2004)

    Google Scholar 

  10. Giordano, S.: Electronic Evidence and the Law. Information System Frontiers 6(2), 161–174 (2004)

    Article  Google Scholar 

  11. Brenner, S.: U.S. Cybercrime Law: Defining Offenses. Information System Frontiers 6(2), 115–132 (2004)

    Article  Google Scholar 

  12. Computer Forensics. US-CERT (2008)

    Google Scholar 

  13. Decree for Proclamation of Information Security Law (In Croatian: Odluka oproglašenju Zakona o informacijskoj sigurnosti). Hrvatski Sabor, Zagreb, NN79/ (July 2007)

    Google Scholar 

  14. Decree for Proclamation of Law for Affirmation of C onvention on Cybercrime(In Croatian: Odluka o proglašenju Zakona o potvrđivanju Konvencije o kibernetičkom kriminalu). Hrvatski Sabor, Zagreb, NN173/ (July 2002)

    Google Scholar 

  15. Basics of Computer Forensics Analysis (In Croatian: Osnove računalne forenzičke analize). CARNet CERT, Zagreb, CCERT-PUBDOC-2006- 11-174 (2006)

    Google Scholar 

  16. Rulebook for Coordination of Prevention and Response on Computer Security Incidents (In Croatian: Pravilnik o koordinaciji prevencije i odgovora na računalno-sigurnosne incidente). Zavod za sigurnost informacijskih sustava, Zagreb (2008)

    Google Scholar 

  17. Rulebook of Information Systems Security (In Croatian: Pravilnik o standardima sigurnosti informacijskih sustava). Zavod za informacijsku sigurnost, Zagreb (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Remenar, V., Peraković, D., Zovak, G. (2011). The Framework of e-Forensics in the Republic of Croatia. In: Snasel, V., Platos, J., El-Qawasmeh, E. (eds) Digital Information Processing and Communications. ICDIPC 2011. Communications in Computer and Information Science, vol 189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22410-2_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22410-2_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22409-6

  • Online ISBN: 978-3-642-22410-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics