SlideShare a Scribd company logo
FUNDAMENTAL OF
DIGITAL FORENSICS
S1 Teknologi Informasi
UNIVERSITAS TEKNOKRAT INDONESIA
Februari 2022
Bandarlampung
By : Jupriyadi
OUTLINE
Forensic and Digital Forensic
Definition
01 03
Digital Evidence
Digital Forensic Model
02 04
Need and Benefit of Digital Forensic
Application of Digital Forensic
Skill Required and Challenges Faced By
Digital Forensic
What is Forensics ... ?
Forensics ... ?
 Collection and analysis of evidence
 Using scientific test or techniques
 To establish fact againts crime
 For presenting in al legal proceeding
 Therefore forensic science is a scientific method of
gathering and examining information about the past which
is then used in court of law
Digital forensic is the use of scientically derived and proven methode
toward:
 the preservation, collection, validation, identification, analysis,
interpretation, documentation, and presentation of digital
evidence derived from digital device
 for the purpose of facilitation or furthering the reconstruction of
events found to be criminal, or helping to anticipate unauthorezed
actions shown to be disruptive to planned operations
Branches of Digital Forensics
• The technical aspect of an investigation is divided into several sub-
branches, relating to the type of digital devices involved:
 Computer forensics, Firewall forensics, database forensics, network
forensics, forensic data analysis and mobile devices forensics
• The typical forensic process encompasses the seizure, forensic
imaging and analysis of digital media and the production of a report
into collected evidence
Examples of Digital Forensic Devices
Digital Evidence ... ???
• Evidence
√ A piece of information that supports a conclusion
• Digital evidence
 Any data that is recorded or preserved on any medium or by a
computer system or other similar digital device, that can be
read or understood by a person or a computer system or other
similar device
 It includes a display, printout or other output of that data
Characteristics of Digital Evidence
An evidence must be:
 Admissible
Conformity with the common law an legislative rules
Authentic
In linking data to specific individuals and events
Fragile
Easy altered, damaged, or destroyed
Accurate
Believed and is consostent
Complete
With a full story of particular ciscumstances
Convinsing to juries
To have probative value, subjective and practical test of
presentation - To proving beyond doubt
Examples of Digital Evidence
 e-mails
 Digital photograps
 ATM transaction logs
 word processing documents
 instant message histories
 files saved from accounting
program
 spreadsheets
 internet browser histories
 databases
 the contents of computer
memory
 computer backups, komputer
printouts
 global positioning system tracks
 log from a hotels electronic door
locks and
 digital video or audio files
Type of Digital Evidence
1. Persistant data
Meaning data that remains intact when the digital device is
turned off. E.g. hard drives, disk drives and removable storage
devices such as USB drives or flash drives).
2. Volatile data
Which is data that would be lost if the digital device is turned off.
E.g. deleted files, computer history, the computers registry,
temporary files and web browsing history
Location for Evidence
1. Internet history files
2. Temporary internet files
3. Slack/Unlocated space
4. Buddy lists, personal chat room records, PTP, other saved areas
5. New groups/club list/posting
6. Setting, folder structure, file names
7. File storages dates
8. Software/hardware added
9. File sharing ability
Different Digital Forensic Models Published
No. Digital forensic model or framwork No of phases
1 Computer forensic process M.Politt, 1995 4 processes
2 Generic Investgative Process Palmer, 2001) 7 clases
3 Abstract model of digital forensic procedure
(Reith, Carr, & Gumsch, 2002)
9 processes
4 An integrated digital investigation process
(Carrier & Spafford, 2003)
17 processes
5 End to end digital investigation (Stephenson,
2003)
9 steps
6 Enhanced integrated digital investigation
process (Baryamureeba & Tushabe, 2004)
21 phases
Different Digital Forensic Models Published
No. Digital forensic model or framwork No of phases
7 Entended model of cybercrime investigation (Ciardhuain,
2004)
13 activities
8 Hierachical, Objective - bases framwork (Beebe Clark,
2004)
6 phases
9 Event based digital forensic investigation framwork
(Carier and Spafoford, 2004)
16 phases
10 Forensic Process (Kent K, Chevalier, Grace Dang, 2006) 4 processes
11 Investigation framework (Kohn, Eloff, & Oriva, 2006) 3 stages
12 Computer forensic field triage process model K. Rogers,
Goldman, Mislan, Wdge, & Debrota, 2006)
4 phases
13 Investigative process model (Freiling & Schawittay, 2007) 4 phases
Digital Forensic Basic Model
Need for Digital Forensic
1. To ensure the integrity of digital system
2. To focus on the response to hi-tech offenses, started to intervene
the system
3. Digital forensics has been efficiently used to track down the
terrorists from the various parts of the world
4. To produce evidence in the courd that can lead to the
punishment of th criminal
The Benefits of Digital Forensic
Digital forensics help to protect from and solve cases involving :
1. Theft of intellectual property
This pertains to any act that allows access to patents, trade
secrets, customer data, and ani confidential information
2. Financial fraud
This pertains to anything that uses fraudulent solicitation of
victims information to conduct fraudulent transactions
The Benefits of Digital Forensic
3. Hacker system penetration
Taking advantage of vulnerabilities of system or software using
tools such as rootkits and sniffers
4. Distribution and execution of viruses and worms
These are the most common forms of cyber crime and often cost
the most damage
Skill Required for Digital Forensic
1. Application of programming or computer-related experience
2. Broad understanding of operating systems and applications
3. Strong analytical skills
4. Strong computer science fundamentals
5. Strong system administrative skills
6. Knowledge of the latest intruder tools
7. Knowledge of cryptography and steganography
8. Strong understanding of the rules of evidence and evidence handling
9. Ability to be an expert witness in a court of law
TERIMAKASIH

More Related Content

What's hot

computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Challenges in Cloud Forensics
Challenges in Cloud ForensicsChallenges in Cloud Forensics
Challenges in Cloud ForensicsGayan Weerarathna
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensicsanupriti
 

What's hot (20)

Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Challenges in Cloud Forensics
Challenges in Cloud ForensicsChallenges in Cloud Forensics
Challenges in Cloud Forensics
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Incident response
Incident responseIncident response
Incident response
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 

Similar to Fundamental digital forensik

Digital forensic
Digital forensicDigital forensic
Digital forensicChandan Sah
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docxAliAshraf68199
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptxAlAsad4
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh tManesh T
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer ForensicEditor IJCTER
 

Similar to Fundamental digital forensik (20)

Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptx
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 

More from newbie2019

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensiknewbie2019
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handlingnewbie2019
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injectionnewbie2019
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web securitynewbie2019
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information Systemnewbie2019
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018newbie2019
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutannewbie2019
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptographynewbie2019
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)newbie2019
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attacknewbie2019
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principalsnewbie2019
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 
Chapter 1 introduction
Chapter 1 introductionChapter 1 introduction
Chapter 1 introductionnewbie2019
 

More from newbie2019 (20)

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
C02
C02C02
C02
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
Chapter 1 introduction
Chapter 1 introductionChapter 1 introduction
Chapter 1 introduction
 

Recently uploaded

2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Abhinav Gaur Kaptaan
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxjmorse8
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTechSoup
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointELaRue0
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online PresentationGDSCYCCE
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersPedroFerreira53928
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17Celine George
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya - UEM Kolkata Quiz Club
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 

Recently uploaded (20)

2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Morse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptxMorse OER Some Benefits and Challenges.pptx
Morse OER Some Benefits and Challenges.pptx
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 

Fundamental digital forensik

  • 1. FUNDAMENTAL OF DIGITAL FORENSICS S1 Teknologi Informasi UNIVERSITAS TEKNOKRAT INDONESIA Februari 2022 Bandarlampung By : Jupriyadi
  • 2. OUTLINE Forensic and Digital Forensic Definition 01 03 Digital Evidence Digital Forensic Model 02 04 Need and Benefit of Digital Forensic Application of Digital Forensic Skill Required and Challenges Faced By Digital Forensic
  • 4. Forensics ... ?  Collection and analysis of evidence  Using scientific test or techniques  To establish fact againts crime  For presenting in al legal proceeding  Therefore forensic science is a scientific method of gathering and examining information about the past which is then used in court of law
  • 5. Digital forensic is the use of scientically derived and proven methode toward:  the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital device  for the purpose of facilitation or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorezed actions shown to be disruptive to planned operations
  • 6. Branches of Digital Forensics • The technical aspect of an investigation is divided into several sub- branches, relating to the type of digital devices involved:  Computer forensics, Firewall forensics, database forensics, network forensics, forensic data analysis and mobile devices forensics • The typical forensic process encompasses the seizure, forensic imaging and analysis of digital media and the production of a report into collected evidence
  • 7. Examples of Digital Forensic Devices
  • 8. Digital Evidence ... ??? • Evidence √ A piece of information that supports a conclusion • Digital evidence  Any data that is recorded or preserved on any medium or by a computer system or other similar digital device, that can be read or understood by a person or a computer system or other similar device  It includes a display, printout or other output of that data
  • 9. Characteristics of Digital Evidence An evidence must be:  Admissible Conformity with the common law an legislative rules Authentic In linking data to specific individuals and events Fragile Easy altered, damaged, or destroyed Accurate Believed and is consostent Complete With a full story of particular ciscumstances Convinsing to juries To have probative value, subjective and practical test of presentation - To proving beyond doubt
  • 10. Examples of Digital Evidence  e-mails  Digital photograps  ATM transaction logs  word processing documents  instant message histories  files saved from accounting program  spreadsheets  internet browser histories  databases  the contents of computer memory  computer backups, komputer printouts  global positioning system tracks  log from a hotels electronic door locks and  digital video or audio files
  • 11. Type of Digital Evidence 1. Persistant data Meaning data that remains intact when the digital device is turned off. E.g. hard drives, disk drives and removable storage devices such as USB drives or flash drives). 2. Volatile data Which is data that would be lost if the digital device is turned off. E.g. deleted files, computer history, the computers registry, temporary files and web browsing history
  • 12. Location for Evidence 1. Internet history files 2. Temporary internet files 3. Slack/Unlocated space 4. Buddy lists, personal chat room records, PTP, other saved areas 5. New groups/club list/posting 6. Setting, folder structure, file names 7. File storages dates 8. Software/hardware added 9. File sharing ability
  • 13. Different Digital Forensic Models Published No. Digital forensic model or framwork No of phases 1 Computer forensic process M.Politt, 1995 4 processes 2 Generic Investgative Process Palmer, 2001) 7 clases 3 Abstract model of digital forensic procedure (Reith, Carr, & Gumsch, 2002) 9 processes 4 An integrated digital investigation process (Carrier & Spafford, 2003) 17 processes 5 End to end digital investigation (Stephenson, 2003) 9 steps 6 Enhanced integrated digital investigation process (Baryamureeba & Tushabe, 2004) 21 phases
  • 14. Different Digital Forensic Models Published No. Digital forensic model or framwork No of phases 7 Entended model of cybercrime investigation (Ciardhuain, 2004) 13 activities 8 Hierachical, Objective - bases framwork (Beebe Clark, 2004) 6 phases 9 Event based digital forensic investigation framwork (Carier and Spafoford, 2004) 16 phases 10 Forensic Process (Kent K, Chevalier, Grace Dang, 2006) 4 processes 11 Investigation framework (Kohn, Eloff, & Oriva, 2006) 3 stages 12 Computer forensic field triage process model K. Rogers, Goldman, Mislan, Wdge, & Debrota, 2006) 4 phases 13 Investigative process model (Freiling & Schawittay, 2007) 4 phases
  • 16. Need for Digital Forensic 1. To ensure the integrity of digital system 2. To focus on the response to hi-tech offenses, started to intervene the system 3. Digital forensics has been efficiently used to track down the terrorists from the various parts of the world 4. To produce evidence in the courd that can lead to the punishment of th criminal
  • 17. The Benefits of Digital Forensic Digital forensics help to protect from and solve cases involving : 1. Theft of intellectual property This pertains to any act that allows access to patents, trade secrets, customer data, and ani confidential information 2. Financial fraud This pertains to anything that uses fraudulent solicitation of victims information to conduct fraudulent transactions
  • 18. The Benefits of Digital Forensic 3. Hacker system penetration Taking advantage of vulnerabilities of system or software using tools such as rootkits and sniffers 4. Distribution and execution of viruses and worms These are the most common forms of cyber crime and often cost the most damage
  • 19. Skill Required for Digital Forensic 1. Application of programming or computer-related experience 2. Broad understanding of operating systems and applications 3. Strong analytical skills 4. Strong computer science fundamentals 5. Strong system administrative skills 6. Knowledge of the latest intruder tools 7. Knowledge of cryptography and steganography 8. Strong understanding of the rules of evidence and evidence handling 9. Ability to be an expert witness in a court of law