SlideShare a Scribd company logo
Computer Forensic Lab
Presented by
Sabto Prabowo
4711010010
What is Computer Forensic Lab?
Its a lab/workshop who serve
requirements of a forensic and
what equipment is needed.
Physical Security Needs of a Forensic
Lab
●
Access to emergency services
●
Lighting at the site
●
Physical environment of the lab
●
Structural design of parking
Physical Security Recomendation For
A Lab
Basic Requirements
●
name of the visitor
●
date and time of the visit
●
purpose of the visit
●
name of the official the visitor has come to see
●
place the visitor has come from
●
address of the visitor
Physical Security Recomendation For
A Lab
Workstation Security
Workstations should be shielded from transmitting
electromagnetic signals. It is a known fact that
electronic equipment emits electromagnetic radiation.
There are certain pieces of equipment that can
intercept this radiation.
Fire Safety
Fire can be disastrous in a forensic lab. Any electrical
device can be a source of fire, though this does not
gen erally happen with computers. On a few
occasions, short circuits can also damage cables
These short circuits might even ignite flammable items
close by.
Evidence Locker Recommendation
The containers used to store evidence must be secured
so that unauthorized persons cannot access the
evidence. They should be located in a restricted area
that is only accessible to lab personnel. All evidence
containers must be monitored, and they must be
locked when not in use.
Checking Security of Forensic Lab
• Examine the ceiling, floor, and exterior walls of
the lab at least once a month to check for
structural integrity.
• Examine the doors to ensure they close and lock
correctly.
• Check if the locks are working properly or if they
need to be replaced.
• Examine the log register to make sure all entries
are correct and complete.
• Check the log sheets for evidence containers to
check when the containers were opened and
Work Area in Computer Security Lab
The forensic lab should be built in an area where human
traffic is light. An ideal lab consists of two forensic
workstations and one ordinary workstation with
Internet connectivity. The number of forensic
workstations varies according to the number of cases
and processes handled in the lab.
General Config of Conputer Security
Lab
●
Workstation
●
Uniterruptable Power Supply
●
Bookracks
●
Necessary Software
●
References Materials
●
Safe Locker and Storage shelf
●
LAN and Internet Connectivity
Equipment Required in a Forensic Lab
Common Needs
●
Cabinets
●
Printer and Scanner
●
Additional Hard Drives
●
Tape Drives
Equipment Required in a Forensic Lab
Communication Needs
●
Bandwidth
●
Dial-Up / Broadband Access
●
Local Network
Equipment Required in a Forensic Lab
Electrical Needs
●
Amperage
●
Emergency Power and Lighting
●
Electrical Outlets
●
Uniterruptable Power Supply
Basic Workstation Requirements in a
Forensic Lab
• Processor with high computing speed
• 256 MB RAM for satisfying minimum processing requirements
• DVD-ROM with read/write capabilities
• Motherboard that supports IDE, SCSI, and USB, with a slot for a
LAN/WAN card and a fan attached for cooling the processor
• Tape drive, USB drive, and removable drive bays
• Monitor, keyboard, and mouse
• Minimum of two hard drives for loading two different operating
systems, preferably Windows XP and Linux
Maintaining Operating System and
Application Inventories
●
Windows Vista, XP, 2003, and 2000 operating systems
●
Linux, Unix, and Mac OS X operating systems
●
Microsoft Office XP, 2007, 2003, 2000, 97, and 95
●
Quicken
●
Programming language applications such as Visual
Studio
●
Specialized viewers such as QuickView and ACDSee
Maintaining Operating System and
Application Inventories
●
Specialized viewers such as QuickView and ACDSee
●
Corel Office Suite
●
StarOffice/OpenOffice
●
Peachtree accounting applications
●
Older operating systems and applications such as MS-
DOS, Windows 3.11, and Novell for examining older
systems
Maintaining Operating System and
Application Inventories
●
Forensic software with advanced features and
functionalities, such as:
●
Bit-stream backup utilities
●
Password recovery tools
●
Recovery tools for deleted data
●
Partition recovery tools
●
Searching tools
●
Firewalls and intrusion detection systems
●
Updated antivirus software
Required Forensic Tools
●
Storage Bags
●
Remote Chargers
●
Write Block Protection Device
●
Data Acquisition Tools
●
Forensic Archives and Restore Devices
●
Mobile Forensic Laptops
●
Forensic Workstations
●
Imaging Workstations
●
Additional Software
Thank you so much

More Related Content

Similar to Latihan3 comp-forensic-bab2

File000120
File000120File000120
File000120
Desmond Devendran
 
Network and server performance monitoring training
Network and server performance monitoring trainingNetwork and server performance monitoring training
Network and server performance monitoring training
ManageEngine, Zoho Corporation
 
Computer system organization
Computer system organizationComputer system organization
Computer system organization
Syed Zaid Irshad
 
AN INTRODUCTION TO OPERATING SYSTEMS : CONCEPTS AND PRACTICE - PHI Learning
AN INTRODUCTION TO OPERATING SYSTEMS : CONCEPTS AND PRACTICE - PHI LearningAN INTRODUCTION TO OPERATING SYSTEMS : CONCEPTS AND PRACTICE - PHI Learning
AN INTRODUCTION TO OPERATING SYSTEMS : CONCEPTS AND PRACTICE - PHI Learning
PHI Learning Pvt. Ltd.
 
SIGFOX Makers Tour - Barcelona
SIGFOX Makers Tour - BarcelonaSIGFOX Makers Tour - Barcelona
SIGFOX Makers Tour - Barcelona
Nicolas Lesconnec
 
Module 1 - Digital Devices and its Application
Module 1 - Digital Devices and its ApplicationModule 1 - Digital Devices and its Application
Module 1 - Digital Devices and its Application
Dhiviya Rose
 
Ch02.pptx
Ch02.pptxCh02.pptx
Come See What’s Cooking in My Lab
Come See What’s Cooking in My LabCome See What’s Cooking in My Lab
Come See What’s Cooking in My Lab
EnergySec
 
Server room
Server roomServer room
Server room
Shivani Nandgowle
 
dokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.pptdokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.ppt
ApdiazizHussein
 
Project_updated
Project_updatedProject_updated
Project_updated
Shaikh Zaid
 
Embedded system and its platforms
Embedded system and its platformsEmbedded system and its platforms
Embedded system and its platforms
Mrunal Deshkar
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
ThangDang53
 
Time Series Anomaly Detection with Azure and .NETT
Time Series Anomaly Detection with Azure and .NETTTime Series Anomaly Detection with Azure and .NETT
Time Series Anomaly Detection with Azure and .NETT
Marco Parenzan
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
DSL, Gfast and Wireless Test Software: Test Sentinel
DSL, Gfast and Wireless Test Software: Test SentinelDSL, Gfast and Wireless Test Software: Test Sentinel
DSL, Gfast and Wireless Test Software: Test Sentinel
UNH InterOperability Lab
 
Things You MUST Know Before Deploying OpenStack: Bruno Lago, Catalyst IT
Things You MUST Know Before Deploying OpenStack: Bruno Lago, Catalyst ITThings You MUST Know Before Deploying OpenStack: Bruno Lago, Catalyst IT
Things You MUST Know Before Deploying OpenStack: Bruno Lago, Catalyst IT
OpenStack
 
EMBEDDED_SYSTEM_INTRODUCTION.pdf
EMBEDDED_SYSTEM_INTRODUCTION.pdfEMBEDDED_SYSTEM_INTRODUCTION.pdf
EMBEDDED_SYSTEM_INTRODUCTION.pdf
NadiSarj2
 
Track 2 session 4 - st dev con 2016 - opensoftwarex
Track 2   session 4 - st dev con 2016 - opensoftwarexTrack 2   session 4 - st dev con 2016 - opensoftwarex
Track 2 session 4 - st dev con 2016 - opensoftwarex
ST_World
 
Null mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNull mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmware
Nitesh Malviya
 

Similar to Latihan3 comp-forensic-bab2 (20)

File000120
File000120File000120
File000120
 
Network and server performance monitoring training
Network and server performance monitoring trainingNetwork and server performance monitoring training
Network and server performance monitoring training
 
Computer system organization
Computer system organizationComputer system organization
Computer system organization
 
AN INTRODUCTION TO OPERATING SYSTEMS : CONCEPTS AND PRACTICE - PHI Learning
AN INTRODUCTION TO OPERATING SYSTEMS : CONCEPTS AND PRACTICE - PHI LearningAN INTRODUCTION TO OPERATING SYSTEMS : CONCEPTS AND PRACTICE - PHI Learning
AN INTRODUCTION TO OPERATING SYSTEMS : CONCEPTS AND PRACTICE - PHI Learning
 
SIGFOX Makers Tour - Barcelona
SIGFOX Makers Tour - BarcelonaSIGFOX Makers Tour - Barcelona
SIGFOX Makers Tour - Barcelona
 
Module 1 - Digital Devices and its Application
Module 1 - Digital Devices and its ApplicationModule 1 - Digital Devices and its Application
Module 1 - Digital Devices and its Application
 
Ch02.pptx
Ch02.pptxCh02.pptx
Ch02.pptx
 
Come See What’s Cooking in My Lab
Come See What’s Cooking in My LabCome See What’s Cooking in My Lab
Come See What’s Cooking in My Lab
 
Server room
Server roomServer room
Server room
 
dokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.pptdokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.ppt
 
Project_updated
Project_updatedProject_updated
Project_updated
 
Embedded system and its platforms
Embedded system and its platformsEmbedded system and its platforms
Embedded system and its platforms
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Time Series Anomaly Detection with Azure and .NETT
Time Series Anomaly Detection with Azure and .NETTTime Series Anomaly Detection with Azure and .NETT
Time Series Anomaly Detection with Azure and .NETT
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
DSL, Gfast and Wireless Test Software: Test Sentinel
DSL, Gfast and Wireless Test Software: Test SentinelDSL, Gfast and Wireless Test Software: Test Sentinel
DSL, Gfast and Wireless Test Software: Test Sentinel
 
Things You MUST Know Before Deploying OpenStack: Bruno Lago, Catalyst IT
Things You MUST Know Before Deploying OpenStack: Bruno Lago, Catalyst ITThings You MUST Know Before Deploying OpenStack: Bruno Lago, Catalyst IT
Things You MUST Know Before Deploying OpenStack: Bruno Lago, Catalyst IT
 
EMBEDDED_SYSTEM_INTRODUCTION.pdf
EMBEDDED_SYSTEM_INTRODUCTION.pdfEMBEDDED_SYSTEM_INTRODUCTION.pdf
EMBEDDED_SYSTEM_INTRODUCTION.pdf
 
Track 2 session 4 - st dev con 2016 - opensoftwarex
Track 2   session 4 - st dev con 2016 - opensoftwarexTrack 2   session 4 - st dev con 2016 - opensoftwarex
Track 2 session 4 - st dev con 2016 - opensoftwarex
 
Null mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNull mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmware
 

More from sabtolinux

Kasus cybercrime
Kasus cybercrimeKasus cybercrime
Kasus cybercrimesabtolinux
 
Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6
sabtolinux
 
Latihan8 comp-forensic-bab5
Latihan8 comp-forensic-bab5Latihan8 comp-forensic-bab5
Latihan8 comp-forensic-bab5
sabtolinux
 
Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6
sabtolinux
 
Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6
sabtolinux
 
Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5
sabtolinux
 
Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3
sabtolinux
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
sabtolinux
 
Latihan1 comp-forensic
Latihan1 comp-forensicLatihan1 comp-forensic
Latihan1 comp-forensic
sabtolinux
 
Latihan 1 computer forensic
Latihan 1 computer  forensicLatihan 1 computer  forensic
Latihan 1 computer forensic
sabtolinux
 
Macam2 sertifikasi linux
Macam2 sertifikasi linuxMacam2 sertifikasi linux
Macam2 sertifikasi linux
sabtolinux
 

More from sabtolinux (11)

Kasus cybercrime
Kasus cybercrimeKasus cybercrime
Kasus cybercrime
 
Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6Latihan9 comp-forensic-bab6
Latihan9 comp-forensic-bab6
 
Latihan8 comp-forensic-bab5
Latihan8 comp-forensic-bab5Latihan8 comp-forensic-bab5
Latihan8 comp-forensic-bab5
 
Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6
 
Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6
 
Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5Latihan6 comp-forensic-bab5
Latihan6 comp-forensic-bab5
 
Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3Latihan4 comp-forensic-bab3
Latihan4 comp-forensic-bab3
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
 
Latihan1 comp-forensic
Latihan1 comp-forensicLatihan1 comp-forensic
Latihan1 comp-forensic
 
Latihan 1 computer forensic
Latihan 1 computer  forensicLatihan 1 computer  forensic
Latihan 1 computer forensic
 
Macam2 sertifikasi linux
Macam2 sertifikasi linuxMacam2 sertifikasi linux
Macam2 sertifikasi linux
 

Recently uploaded

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 

Recently uploaded (20)

20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 

Latihan3 comp-forensic-bab2

  • 1. Computer Forensic Lab Presented by Sabto Prabowo 4711010010
  • 2. What is Computer Forensic Lab? Its a lab/workshop who serve requirements of a forensic and what equipment is needed.
  • 3. Physical Security Needs of a Forensic Lab ● Access to emergency services ● Lighting at the site ● Physical environment of the lab ● Structural design of parking
  • 4. Physical Security Recomendation For A Lab Basic Requirements ● name of the visitor ● date and time of the visit ● purpose of the visit ● name of the official the visitor has come to see ● place the visitor has come from ● address of the visitor
  • 5. Physical Security Recomendation For A Lab Workstation Security Workstations should be shielded from transmitting electromagnetic signals. It is a known fact that electronic equipment emits electromagnetic radiation. There are certain pieces of equipment that can intercept this radiation.
  • 6. Fire Safety Fire can be disastrous in a forensic lab. Any electrical device can be a source of fire, though this does not gen erally happen with computers. On a few occasions, short circuits can also damage cables These short circuits might even ignite flammable items close by.
  • 7. Evidence Locker Recommendation The containers used to store evidence must be secured so that unauthorized persons cannot access the evidence. They should be located in a restricted area that is only accessible to lab personnel. All evidence containers must be monitored, and they must be locked when not in use.
  • 8. Checking Security of Forensic Lab • Examine the ceiling, floor, and exterior walls of the lab at least once a month to check for structural integrity. • Examine the doors to ensure they close and lock correctly. • Check if the locks are working properly or if they need to be replaced. • Examine the log register to make sure all entries are correct and complete. • Check the log sheets for evidence containers to check when the containers were opened and
  • 9. Work Area in Computer Security Lab The forensic lab should be built in an area where human traffic is light. An ideal lab consists of two forensic workstations and one ordinary workstation with Internet connectivity. The number of forensic workstations varies according to the number of cases and processes handled in the lab.
  • 10. General Config of Conputer Security Lab ● Workstation ● Uniterruptable Power Supply ● Bookracks ● Necessary Software ● References Materials ● Safe Locker and Storage shelf ● LAN and Internet Connectivity
  • 11. Equipment Required in a Forensic Lab Common Needs ● Cabinets ● Printer and Scanner ● Additional Hard Drives ● Tape Drives
  • 12. Equipment Required in a Forensic Lab Communication Needs ● Bandwidth ● Dial-Up / Broadband Access ● Local Network
  • 13. Equipment Required in a Forensic Lab Electrical Needs ● Amperage ● Emergency Power and Lighting ● Electrical Outlets ● Uniterruptable Power Supply
  • 14. Basic Workstation Requirements in a Forensic Lab • Processor with high computing speed • 256 MB RAM for satisfying minimum processing requirements • DVD-ROM with read/write capabilities • Motherboard that supports IDE, SCSI, and USB, with a slot for a LAN/WAN card and a fan attached for cooling the processor • Tape drive, USB drive, and removable drive bays • Monitor, keyboard, and mouse • Minimum of two hard drives for loading two different operating systems, preferably Windows XP and Linux
  • 15. Maintaining Operating System and Application Inventories ● Windows Vista, XP, 2003, and 2000 operating systems ● Linux, Unix, and Mac OS X operating systems ● Microsoft Office XP, 2007, 2003, 2000, 97, and 95 ● Quicken ● Programming language applications such as Visual Studio ● Specialized viewers such as QuickView and ACDSee
  • 16. Maintaining Operating System and Application Inventories ● Specialized viewers such as QuickView and ACDSee ● Corel Office Suite ● StarOffice/OpenOffice ● Peachtree accounting applications ● Older operating systems and applications such as MS- DOS, Windows 3.11, and Novell for examining older systems
  • 17. Maintaining Operating System and Application Inventories ● Forensic software with advanced features and functionalities, such as: ● Bit-stream backup utilities ● Password recovery tools ● Recovery tools for deleted data ● Partition recovery tools ● Searching tools ● Firewalls and intrusion detection systems ● Updated antivirus software
  • 18. Required Forensic Tools ● Storage Bags ● Remote Chargers ● Write Block Protection Device ● Data Acquisition Tools ● Forensic Archives and Restore Devices ● Mobile Forensic Laptops ● Forensic Workstations ● Imaging Workstations ● Additional Software
  • 19. Thank you so much