With the development of information communication systems and the services they provide, the complexity of the organization of information within information systems is growing. The complexity itself contributes to the increase in the number of electronic incidents and affects the high demands of forensic procedure implementation. It is estimated that in the near future the number of electronic incidents will outgrow the number of classical criminal incidents both financially and quantitatively. Due to the things mentioned above, early identification, discovering and taking legal proceedings against the perpetrator of an electronic incident are necessary. It is necessary to investigate all electronic incidents adequately and promptly and adapt the legal framework and laws related to e-Forensics. e-Forensics is a relatively new discipline within which there is a low level of standardization and consistency. With the purpose of increasing the quality of performing e-Forensics and presenting the evidence in a possible judicial proceeding one has to define the legal framework of e-Forensics. The analysis of current legal standards and methods used to perform e-Forensics is presented in the paper as well as the proposal of performing e-Forensics with defined procedures and methods.
[1]
Susan W. Brenner,et al.
U.S. Cybercrime Law: Defining Offenses
,
2004,
Inf. Syst. Frontiers.
[2]
Joseph J. Schwerha.
Cybercrime: Legal Standards Governing the Collection of Digital Evidence
,
2004,
Inf. Syst. Frontiers.
[3]
Dario Forte.
Computer forensics: Are you qualified?
,
2008
.
[4]
Linda Volonino.
Electronic Evidence and Computer Forensics
,
2003,
Commun. Assoc. Inf. Syst..
[5]
Hossein Bidgoli.
Handbook of Information Security
,
2005
.
[6]
William H. Allen.
Computer Forensics
,
2005,
IEEE Secur. Priv..
[7]
Axel W. Krings,et al.
A Formalization of Digital Forensics
,
2004,
Int. J. Digit. EVid..
[8]
Scott M. Giordano.
Electronic Evidence and the Law
,
2004,
Inf. Syst. Frontiers.
[9]
Gregg H. Gunsch,et al.
An Examination of Digital Forensic Models
,
2002,
Int. J. Digit. EVid..
[10]
Matthew Meyers,et al.
Computer Forensics: The Need for Standardization and Certification
,
2004,
Int. J. Digit. EVid..
[11]
Mark Taylor,et al.
The legal aspects of corporate computer forensic investigations
,
2007,
Comput. Law Secur. Rev..
[12]
Brian D. Carrier,et al.
File System Forensic Analysis
,
2005
.