digital forensic

Top PDF digital forensic:

Forensic Traceability Index in Digital Forensic Investigation.

Forensic Traceability Index in Digital Forensic Investigation.

Though to some researchers the digital forensic is in- clusive of computer forensic, network forensic, software forensic and information forensic, but it is largely used interchangeably with computer forensic [3]. Computer forensic implies a connection between computers, the scientific method, and crime detection. It includes de- vices other than general-purpose computer systems such as network devices, cell phones, and other devices with embedded systems. There are over hundreds of digital forensic investigation procedures developed in digital forensic investigation practices. An organization tends to develop its own procedures and some focused on the technology aspects such as data acquisition or data analy- sis [6]. Most of these procedures were developed in tack- ling different technology used in the inspected device. As a result, when underlying technology of the target device changes, new procedures have to be developed. However, [7,8] stated that the process of the investigation should be incorporated with the basic procedures in forensic inves- tigation which are preparation, investigation and presen- tation. A categorization of investigation process was done in [9] to group and merge the similar activities or processes in five phases that provide the same output. The phases are: Phase 1 (Preparation), Phase 2 (Collec- tion and Preservation), Phase 3 (Examination and Analy- sis), Phase 4 (Presentation and Reporting), and Phase 5 (Disseminating the case). The researcher also proposed a mapping process of digital forensic investigation process model to eliminate the redundancy of the process in- volved in the model and standardize the terms used in achieving the investigation goal.
Baca lebih lanjut

14 Baca lebih lajut

PROSES DIGITAL FORENSIC STUDI KASUS RECO

PROSES DIGITAL FORENSIC STUDI KASUS RECO

Di sini penulis menjelaskan timeline analysis serta USB flash drive analysis terkait dengan digital forensic. Penulis akan menjelaskan proses digital forensic secara sistematik mulai dari awal sampai dengan akhir yaitu didapatkannya digital evidence.

8 Baca lebih lajut

Traceability in Digital Forensic Investigation Process.

Traceability in Digital Forensic Investigation Process.

These components map to the components in Ramesh’s model: stakeholder, subject and object respectively. Stakeholders refer to the people involve in the whole process of digital forensic investigation such as the auditor, network administrator, complainer (perspective as discussed in [34]) and forensic expert. In this research, these investigators will manage the source of evidence on the incident reported such as the devices (host and network) and the logs involved in the incident. Meanwhile, the digital evidence is defined as events of incident (see subsection Trace Pattern) that are documented in the source of evidence. This current relationship is further illustrated using the diagram in Fig. 6. For the purpose of this research, the domain selected is malware intrusion incident.
Baca lebih lanjut

6 Baca lebih lajut

Adapting Traceability in Digital Forensic Investigation Process.

Adapting Traceability in Digital Forensic Investigation Process.

A research done in [21] introduced a mapping process which occurs inside digital forensic investigation process model. The mapping is formulated by grouping and merging the same activities or processes in five phases that provide the same output into an appropriate phase. From the analysis, most of the models consist of the critical phases which are Phase 2 – Collection and Preservation, Phase 3 – Examination and Analysis, and Phase 4 – Presentation and Reporting except Phase 1 and Phase 5. Even though, Phase 1 and Phase 5 are not included in some of the model reviewed, the study done by [22] [23] [24] [25] [26] [27] [28] [29] [30] indicate that both phases are important to ensure the completeness of the investigation. Phases 1 is to ensure the investigation process can start and run in the proper procedure, and protect the chain of evidence. While by eliminating Phase 5, it will lead to the possibility of the incomplete investigation and no improvement in investigation procedures or policies. Therefore, a good model should consist of all important phases; Preparation Phase, Collection and Preservation Phase, Examination and Analysis Phase, Presentation and Reporting, and Disseminating the case.
Baca lebih lanjut

8 Baca lebih lajut

DEFINISI DEFINISI DIGITAL FORENSIC DARI

DEFINISI DEFINISI DIGITAL FORENSIC DARI

elektronik/internet, biasa disebut tindak kejahatan dunia maya atau lebih dikenal cyber crime . Merujuk pada pernyataan Dr. Edmond Locard yang terkenal dengan Locard’s Exchange Principle yang menyebutkan “ every contact leaves a trace ” yang artinya “setiap kontak meninggalkan jejak” dan dari jejak – jejak yang ditinggalkan akan dapat terlacak. Prinsip tersebut juga berlaku dalam dunia digital, bahwa kejahatan yang dilakukan di dunia digital/internet akan meninggalkan jejak yang nantinya dapat ditelusuri sumber kejahatan sehingga menghasilkan rekonstruksi bagaimana kejahatan tersebut bisa terjadi sehingga mengarah pada suatu kesimpulan darimana kejahatan itu berasal dan siapa pelakunya, itulah inti dari adanya digital forensic atau disebut juga computer forensic .
Baca lebih lanjut

7 Baca lebih lajut

Mapping Process of Digital Forensic Investigation Framework.

Mapping Process of Digital Forensic Investigation Framework.

In the digital forensics investigation practices, there are over hundreds of digital forensics investigation procedures developed all over the world. Each organization tends to develop its own procedures and some focused on the technology aspects such as data acquisition or data analysis [3]. To date, the digital investigation process has been directed by technology being investigated and the available tools. Most of these procedures were developed for tackling different technology used in the inspected device. As a result, when underlying technology of the target device changes, new procedures have to be developed. This paper proposes a mapping process which can simplify the overall process of the previous research that occurs inside the Digital Forensic Investigation Framework. The result of the propose map will reveal the balance of the investigation process to produce a suitable concrete evidence for presentation in a court of law.
Baca lebih lanjut

7 Baca lebih lajut

Definisi Digital Forensic Dari Berbagai

Definisi Digital Forensic Dari Berbagai

Menguasai Komp uter Forensik dan Aplikasinya”, Digital Forensic adalah penggunaan sekumpulan prosedur untuk melakukan pengujian secara menyeluruh suatu sistem komputer dengan mempergunakan software dan tools untuk mengekstrak dan memelihara barang bukti tindakan kriminal.

5 Baca lebih lajut

PERBANDINGAN MEDIA REKAM SUARA PORTABLE DENGAN BERBAGAI MACAM SUMBER SUARA SEBAGAI BARANG BUKTI DALAM FORENSIKA DIGITAL COMPARISON OF PORTABLE VOICE RECORD MEDIA WITH VARIOUS KINDS OF SOUND SOURCES AS PROOF IN DIGITAL FORENSIC

PERBANDINGAN MEDIA REKAM SUARA PORTABLE DENGAN BERBAGAI MACAM SUMBER SUARA SEBAGAI BARANG BUKTI DALAM FORENSIKA DIGITAL COMPARISON OF PORTABLE VOICE RECORD MEDIA WITH VARIOUS KINDS OF SOUND SOURCES AS PROOF IN DIGITAL FORENSIC

Forensika merupakan sesuatu yang berhubungan dengan masalah-masalah hukum. Dengan menghadirkan bukti bukti yang sudah dilakukan analisa pada saat persidangan. Ilmu forensika digital merupakan gabungan antara ilmu forensic dengan menggabungkan analisa data dalam komputer, jaringan, dan perangakat penyimpanan digital yang nantinya digunakan dalam penyelesaian masalah hokum [3]. Dalam praktiknya metode ini kemudian digunakan dalam kepolisian sebagai bentuk barang bukti kejahatan yang dapat digunakan dalam persidangan. Barang bukti tersebut bisa berupa file, gambar, suara, dan video. Sebagian besar barang bukti yang paling banyak digunakan adalah barang bukti suara, dikarenakan suara memiliki tingkat ketepatan yang lebih dibanding barang bukti lain untuk sementara ini. Untuk itu diperlukan Forensik digital suara yang berfokus menguji dan menganalisa kesesuaian dan orisinalitas dari materi konten suara tersebut dengan konten aslinya untuk diuji reabilitas dan validitasnya [4].
Baca lebih lanjut

275 Baca lebih lajut

PENGGUNAAN INFORMASI ELEKTRONIK DAN DOKU

PENGGUNAAN INFORMASI ELEKTRONIK DAN DOKU

Pada dasarnya untuk melakukan Digital Forensic dibutuhkan suatu pendidikan dan pelatihan khusus yang menghasilkan SERTIFIKASI dari setiap orang yang mengikuti pendidikan dan pelatihan Digital Forensic tersebut. Tidak setiap orang yang mengerti dan ahli di bidang komputer dapat diandalkan datau dapat melakukan Digital Forensic dan di dalam persidanganpun, apabila diajukan AHLI yang akan menerangkan menegani Digital Forensic, harus terlebih dahulu ditanyakan mengenai catatan akademiknya yang harus berkaitan dengan Ilmu Komputer dan SERTIFIKASI dari AHLI yang bersangkutan, apabila AHLI tersebut tidak memiliki catatan akademik yang berkaitan dengan Ilmu Komputer dan memiliki SERTIFIKASI tentang Digital Forensic, maka pendapat yang disampaikan di persidangan, patut dikesampingkan.
Baca lebih lanjut

22 Baca lebih lajut

Kompatibilitas Dan Keandalan Investigato. pdf

Kompatibilitas Dan Keandalan Investigato. pdf

5. Prosedur pemeriksaan : menjelaskan tahapan-tahapan yang dilakukan selama proses pemeriksaan dan analisis barang bukti tersebut secara digital forensic. Sebaiknya penjelesana panjang mengenai tahapan tersebut yang akan ditulis dalam laporan, diringkas menjadi SOP ( Standard Operating Procedure ) yang baku dan lengkap. Misalnya DFAT (Digital Forensic Analyst Tean) PUSLABFOR BARESKRIM POLRI memiliki sejumlah SOP, Antara lain. a. SOP 1 tentang Prosedur Pemeriksaan Digital Forensic

6 Baca lebih lajut

ANALISIS LOG SNORT MENGGUNAKAN NETWORK FORENSIC

ANALISIS LOG SNORT MENGGUNAKAN NETWORK FORENSIC

Security is assured to minimize losses caused by network security attack. Network security system is an impor- tant factor to ensure the ability, integrity and validity of data. Such security can be built using the Network Fo- rensic Approach. Network forensic focuses on data obtained based on observation on the network. Observing attacks can use Snort Intrusion Detection System (IDS) tool. Snort is an open source-based NIDS software, wide- ly used to secure a network from malicious activity. The working of snort similar to tcpdump, but focus as a secu- rity packet sniffing. The aim of this study is to analyze the log snort as a result of network forensic. In the experi- ment using topology star. There is 1 PC as a snort, 3 PC client that perform attacks, 7 PC as a client too. In the test conducted set as rules as intelegence. The experimental results show that snort is able to monitor network traffic, so that when the suspicious packet containing the attack will send alerts snort, but it also stores the data in the log. The logs can be investigated using the forensic process model. The results of the investigation indicate there are 3 IP attack, as well as showing the attack data are the date of the attack, attacker IP, attack time, and type of attack.
Baca lebih lanjut

8 Baca lebih lajut

Psikolog Forensik ( Forensic Psychology ) | Karya Tulis Ilmiah

Psikolog Forensik ( Forensic Psychology ) | Karya Tulis Ilmiah

Hukum berasumsi bahwa kebenaran adalah paling mungkin untuk di diperoleh melalui suatu proses adversial."Logika dari jurisprudensi didasarkan dengan diam-diam asumsi yang kebenaran boleh[r]

18 Baca lebih lajut

66.Forensic Accounting and Fraud Investigation

66.Forensic Accounting and Fraud Investigation

PARTICIPANTS Spv PUBLIC TRAINING • DECISION SCIENCE JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC • STRATEGIC MANAGEMENT Corporate Parenting Company Strategic Planning Managing [r]

6 Baca lebih lajut

Automatic Speaker Recognition System For Forensic Applications.

Automatic Speaker Recognition System For Forensic Applications.

This particular project is developed for speaker recognition for unknown sources with the known sources. The unknown sources might be from the crime scene itself or from any phone conversation that has been tapped to the local, police department. This unknown source can be assumed as forensic evidence. The forensic evidence can be defined as the relationship between such trace, whose source is unknown and some other material, which was generated by a known source or known as suspect. Usually, both of them related to a given crime or offense [2]. Therefore, this project would substantially important to help the jury give their judge and it is done by the use of feature extraction technique such as Mel- Frequency Cepstrum Coefficient (MFCC) and the feature matching technique such as Vector Quantization LBG (VQ LBG).
Baca lebih lanjut

24 Baca lebih lajut

PENGANTAR FORENSIC TEKNOLOGI INFORMASI. pdf

PENGANTAR FORENSIC TEKNOLOGI INFORMASI. pdf

“By Extention Image” Yaitu Menampilkan Semua File Image Atau Gambar Pada Data Atau Drive Yang Akan Di Analisis c.. “By ExtentionVideo“ Yaitu Menampilkan Semua File Video Pada Data Ata[r]

22 Baca lebih lajut

KAN-G-19 - KAN Guide for Forensic Science Laboratories

KAN-G-19 - KAN Guide for Forensic Science Laboratories

The scen es of what are generally referred to as ‘major crime’ such as rape or murder require stringent attention to control and preservation. Access to the scene of crime should be controllable and limited, achieved by creation of at least one access cordon; in some cases a second inner cordon may be used. A record should be retained of all persons entering and leaving the scene of crime. All personnel entering the scene shall wear personal protective equipment that ensures that they do not contaminate the scene. The forensic unit shall dispose of relevant items used or worn at the scene of crime in a timely manner, to ensure that exhibits recovered from other scenes of crime are not compromised.
Baca lebih lanjut

46 Baca lebih lajut

accountin students on forensic accounting

accountin students on forensic accounting

Contents part 4 part 3 part 2 part 1 Notes for teachers and lecturers xiii Notes for students xv Introduction to double entry bookkeeping 1 The accounting equation and the balance s[r]

793 Baca lebih lajut

Computer Forensic Josua M Sinambela

Computer Forensic Josua M Sinambela

Definisi Computer Forensic  Komputer forensik juga dapat diartikan setiap aktivitas yang berhubungan dengan pemeliharaan, identifikasi, pengambilan – penyaringan dan dokumentasi sert[r]

23 Baca lebih lajut

ACCOUNTANTS PERCEPTION OF FORENSIC

ACCOUNTANTS PERCEPTION OF FORENSIC

Ramaswamy (2005) believed that forensic accountant are distinctively positioned to be able to uncover financial deceptions,” his prominent skills being an in-depth knowledge of financial statements, the ability to critically analyze them, and a thorough understanding of fraud schemes. He also believed that forensic accountant should have the ability to comprehend the internal-control systems of corporations and be able to assess their risks. The knowledge of psychology helps forensic accountant to understand the impulses behind criminal behavior that motivate and encourage financial deception. Also, interpersonal and communication skills that aid in disseminating information about the company‟s ethics and an understanding of criminal and civil law and of the legal system and court procedures are skills that aid FA‟s. Moreover, Rezaee, Crumbley and Elmore (2006) surveyed opinions of practitioners and academics regarding the importance, relevance, and delivery of forensic accounting education. Their results indicated that “the demand for and the interest in forensic accounting will continue to increase.” Their study further shows that both practitioners and academics viewed accounting education as relevant and beneficial to accounting students. However, the groups differed in opinions regarding topical coverage of forensic accounting.
Baca lebih lanjut

18 Baca lebih lajut

Menentukan Tinggi Badan Dari Tinggi Sternum

Menentukan Tinggi Badan Dari Tinggi Sternum

Estimation of Stature from foot and Shoe Lenght : Applications in Forensic Science.. Identification of An Individual.[r]

2 Baca lebih lajut

Show all 8749 documents...