SlideShare a Scribd company logo
1 of 37
Yudi	
  Prayudi	
  
S1	
  UGM	
  :	
  Computer	
  Graphics	
  
S2	
  ITS	
  :	
  Image	
  Watermarking	
  and	
  
Steganography	
  
S3	
  UGM	
  (Candidate)	
  :	
  Digital	
  Evidence	
  
Cabinets	
  
•  Koordinator	
  Konsentrasi	
  Forensika	
  Digital,	
  
Magister	
  Informatika	
  FTI	
  UII	
  Yogyakarta	
  
•  Staff	
  Pengajar	
  S2	
  Akuntansi	
  Forensik	
  FE	
  UII	
  
•  Kepala	
  Pusat	
  Studi	
  Forensika	
  Digital	
  (PUSFID)	
  
UII	
  Yogyakarta	
  
•  Ketua	
  Bidang	
  Sertifikasi,	
  Standarisasi	
  dan	
  
Akreditasi,	
  AFDI	
  (Asosiasi	
  Forensik	
  Digital	
  
Indonesia)	
  
•  Chairman	
  of	
  HADFEX	
  (Hacking	
  and	
  Digital	
  
Forensics	
  Exposed)	
  
•  CHFI	
  ,	
  Encase,	
  Oxygen,	
  Belkasoft,	
  EnScript	
  
•  Hacker	
  In	
  The	
  Box	
  (2012),	
  Hacker	
  Halted	
  
(2012)	
  
¡  Ilmu	
  Forensik	
  	
  
¡  Forensik	
  Digital	
  
¡  Kebutuhan	
  SDM	
  Forensik	
  Digital	
  
¡  Pendidikan	
  Forensik	
  Digital	
  
¡  Penelitian	
  Forensik	
  Digital	
  
¡  Prospek	
  Forensik	
  Digital	
  di	
  Indonesia	
  
¡  Sharing	
  Knowledge	
  
¡  Asosiasi	
  Forensik	
  Digital	
  Indonesia	
  (AFDI)	
  
Forensic	
  Science	
  is	
  any	
  science	
  used	
  for	
  the	
  
purposes	
  of	
  the	
  law,	
  and	
  therefore	
  provides	
  
impartial	
  scientific	
  evidence	
  for	
  use	
  in	
  the	
  courts	
  of	
  
law.	
  
forensic	
  medicine	
  is	
  	
  the	
  branch	
  of	
  
medicine	
  that	
  interprets	
  and	
  establishes	
  
the	
  medical	
  facts	
  in	
  civil	
  or	
  criminal	
  law	
  
cases	
  
•  Kedokteran	
  Forensik	
  
•  Akuntansi	
  Forensik	
  
•  Fotografi	
  Forensik	
  
•  Psikologi	
  Forensik	
  
•  Forensik	
  Bahasa	
  
•  Kimia	
  Forensik	
  
•  Fisika	
  Forensik	
  
¡  "Digital	
  forensics"	
  was	
  originally	
  simply	
  data	
  recovery.	
  
§  “retrieving information that was deleted by mistake or lost
during a power surge or server crash”
§  Digital	
  forensics	
  developed	
  as	
  an	
  independent	
  field	
  in	
  the	
  late	
  
1990s	
  and	
  early	
  2000s	
  when	
  computer	
  based	
  crime	
  started	
  
growing	
  with	
  the	
  increasing	
  usage	
  of	
  computers	
  and	
  more	
  so,	
  
the	
  Internet.	
  
¡  Forensics	
  à	
  Scientific	
  Methods.	
  
§  “Digital	
  Forensics	
  is	
  a	
  branch	
  of	
  computer	
  science	
  that	
  focuses	
  on	
  
developing	
  evidence	
  pertaining	
  to	
  digital	
  files	
  for	
  use	
  in	
  civil	
  or	
  
criminal	
  court	
  proceedings”	
  
§  “Digital	
  Forensics	
  is	
  the	
  preservation,	
  identification,	
  extraction,	
  
interpretation	
  and	
  documentation	
  of	
  computer	
  evidence	
  which	
  
can	
  be	
  used	
  in	
  the	
  court	
  of	
  law”	
  
¡  Cyberlaw	
  
¡  Cybercrime	
  
¡  Digital	
  Evidence	
  
¡  Court	
  
¡  IT	
  Policy/Ethics	
  
In legal cases, computer forensic
techniques are frequently used to
analyze computer systems belonging
to defendants (in criminal cases) or
litigants (in civil cases).
Crime	
  Scene	
  Investigation	
   Akuisisi	
  dan	
  Imaging	
  
Eksplorasi	
  dan	
  Analisis	
  Dokumentasi	
  dan	
  Presentasi	
  
Objek	
  Utama	
  :	
  	
  
Bukti	
  Elektronik	
  dan	
  Bukti	
  Digital	
  
Aktivitas	
  Utama	
  :	
  Searching	
  
Pertanyaan	
  Utama	
  :	
  	
  
	
  What	
  –	
  Where	
  –	
  When	
  –	
  Who	
  –	
  Why	
  
and	
  How	
  
¡  Computer	
  Science	
  Based	
  
§  Arsitektur	
  Komputer	
  
§  Sistem	
  Operasi	
  
§  File	
  System	
  
¡  Non	
  Computer	
  Based	
  
§  Hukum	
  
§  Kriminologi	
  
§  Psikologi	
  
§  Manajemen	
  
§  Akuntansi	
  
One of the fastest growing
job markets!
21
§  Public-­‐sector	
  
investigations	
  :	
  35	
  	
  %	
  
§  Private-­‐sector	
  
investigations	
  :	
  	
  65	
  	
  %	
  
	
  
¡  Jalur	
  pencapaian	
  kompetensi	
  :	
  	
  
§  Otodidak	
  à	
  hacker,	
  praktisi	
  security	
  
§  Informal	
  :	
  	
  
▪  Vendor	
  	
  Base	
  :	
  
▪  Encase	
  (EnCE)	
  
▪  FTK	
  (ACE)	
  
▪  Oxygen	
  (OCE)	
  	
  
▪  Vendor	
  Neutral	
  :	
  	
  
▪  EC	
  Council	
  :	
  CHFI	
  
▪  SANS	
  :	
  GIAC	
  
▪  ISC2	
  :	
  CCFP	
  
http://www.tomsitpro.com/articles/computer-­‐forensics-­‐certifications,2-­‐650.html	
  
¡  Jalur	
  Pencapaian	
  
Kompetensi	
  
§  Formal	
  	
  
▪  Kuliah	
  Umum	
  :	
  	
  
▪  Penawaran	
  Matakuliah	
  :	
  Ethical	
  
Hacking,	
  Keamanan	
  Informasi,	
  
Digital	
  Forensics	
  
▪  Konsentrasi	
  /	
  Jurusan	
  	
  
▪  Keamanan	
  Informasi	
  /	
  Komputer	
  
▪  Magister	
  Informatika	
  Konsentrasi	
  
Forensika	
  Digital	
  FTI	
  UII	
  
Yogyakarta.	
  
­  Matakuliah	
  Umum	
  dan	
  Thesis	
  :	
  	
  
18	
  SKS	
  
­  Matakuliah	
  Konsentrasi	
  dan	
  
Pilihan	
  :	
  22	
  Sks	
  
M.Kom	
  (CHFI,	
  CEH)	
  
Encase	
  Academic	
  
Belkasoft	
  Academic	
  
Latar	
  Belakang	
  Pengajar	
  :	
  	
  
-­‐  Akademisi	
  Komputer	
  
-­‐  Akademisi	
  Hukum	
  
-­‐  Praktisi	
  Penegak	
  Hukum	
  
-­‐  Praktisi	
  Private	
  Investigator	
  
Knowledge	
  –	
  Skill	
  –	
  Experience	
  
	
  
Non	
  Vendor	
  Base	
  Curriculumn	
  
	
  
Long	
  Life	
  Learning	
  
¡  digital	
  forensics	
  is	
  a	
  	
  largely	
  practitioner-­‐driven	
  
field.	
  
§  Immature Scientific Discipline
§  While	
  many	
  fields	
  have	
  well-­‐defined	
  research	
  
agendas,	
  evolution	
  of	
  the	
  field	
  of	
  digital	
  forensics	
  has	
  	
  
been	
  largely	
  driven	
  by	
  practitioners	
  in	
  the	
  field.	
  
§  	
  As	
  a	
  	
  result,	
  the	
  majority	
  of	
  the	
  tools	
  and	
  practice	
  
have	
  	
  been	
  developed	
  in	
  response	
  to	
  a	
  diverse	
  set	
  of	
  	
  
specific	
  threats	
  or	
  scenarios,	
  rather	
  than	
  as	
  the	
  result	
  	
  
of	
  a	
  research	
  and	
  development	
  plan.	
  
Top	
  Bottom	
  Research	
  
Secure	
  and	
  Trust	
  Environment	
  System	
  for	
  Digital	
  
Forensics	
  Investigation	
  
•  Menjadi	
   platform	
   penelitian	
   interdisipliner	
   yang	
   melibatkan	
  
dosen	
  dan	
  mahasiswa	
  dalam	
  upaya	
  eksplorasi	
  teori,	
  metode,	
  
dan	
   teknik	
   pada	
   bidang	
   digital	
   forensics,	
   cybercrime	
   dan	
  	
  
computer	
  security	
  untuk	
  menghasilkan	
  berbagai	
  inovasi	
  yang	
  
dapat	
  bermanfaat	
  bagi	
  masyarakat	
  luas.	
  	
  
•  Melakukan	
   berbagai	
   aktivitas	
   layanan	
   pada	
   bidang	
   digital	
  
forensics,	
   cybercrime	
   dan	
   	
   computer	
   security	
   baik	
   dalam	
  
lingkup	
  institusi	
  maupun	
  masyarakat	
  luas.	
  
•  Menjadi	
   media	
   bagi	
   civitas	
   akademik	
   untuk	
   menjalin	
  
kerjasama	
   dan	
   jaringan	
   dengan	
   institusi	
   lain	
   	
   baik	
   didalam	
  
didalam	
   maupun	
   di	
   luar	
   negeri	
   yang	
   bergerak	
   pada	
   bidang	
  
digital	
  forensics,	
  cybercrime	
  dan	
  	
  computer	
  security	
  	
  
Kurikulum	
  
Bahan	
  Referensi	
  
Lab	
  Environment	
  
http://catatanforensikadigital.wordpress.com	
  
http://forensics.uii.ac.id	
  
	
  
Digital	
  Forensics	
  ECOSYSTEM	
  
¡  Dibentuk	
  17	
  
November	
  2015	
  
¡  Keanggotaan	
  :	
  
Pelajar	
  dan	
  Umum	
  
¡  Tujuan:	
  memajukan	
  
bidang	
  forensik	
  
digital	
  di	
  Indonesia	
  
melalui	
  sinergi	
  
berbagai	
  pihak.	
  
http://hadfex.com	
  
HITB	
  (Hacker	
  In	
  The	
  Box)	
  
HH	
  (Hacker	
  Halted)	
  
DEFCON	
  
Pengenalan Forensik Digital

More Related Content

What's hot

Konsep Data Mining
Konsep Data MiningKonsep Data Mining
Konsep Data Miningdedidarwis
 
PERANCANGAN DAN PEMBUATAN APLIKASI DATAMINING BERBASIS WEB MENGGUNAKAN ALGORI...
PERANCANGAN DAN PEMBUATAN APLIKASI DATAMINING BERBASIS WEB MENGGUNAKAN ALGORI...PERANCANGAN DAN PEMBUATAN APLIKASI DATAMINING BERBASIS WEB MENGGUNAKAN ALGORI...
PERANCANGAN DAN PEMBUATAN APLIKASI DATAMINING BERBASIS WEB MENGGUNAKAN ALGORI...Uofa_Unsada
 
Contoh laporan kerja praktek ti
Contoh laporan kerja praktek tiContoh laporan kerja praktek ti
Contoh laporan kerja praktek tialvinsadega
 
02-konsep-data-warehouse.ppt
02-konsep-data-warehouse.ppt02-konsep-data-warehouse.ppt
02-konsep-data-warehouse.pptDedek28
 
Kelompok 2 it forensik
Kelompok 2 it forensikKelompok 2 it forensik
Kelompok 2 it forensikFarhanYazid6
 
Privasi Online dan Perlindungan Data Pribadi
Privasi Online dan Perlindungan Data PribadiPrivasi Online dan Perlindungan Data Pribadi
Privasi Online dan Perlindungan Data PribadiICT Watch
 
Etika dan keamanan dalam teknologi informasi
Etika dan keamanan dalam teknologi informasiEtika dan keamanan dalam teknologi informasi
Etika dan keamanan dalam teknologi informasiFitriyana Migumi
 
Keamanan Informasi dan Perlindungan Data Pribadi
Keamanan Informasi dan Perlindungan Data PribadiKeamanan Informasi dan Perlindungan Data Pribadi
Keamanan Informasi dan Perlindungan Data PribadiWidy Widyawan
 
Digital Forensik with Autopsy.pptx
Digital Forensik with Autopsy.pptxDigital Forensik with Autopsy.pptx
Digital Forensik with Autopsy.pptxNADIARAHMINURANGGRAI
 
Proses Data Mining
Proses Data MiningProses Data Mining
Proses Data Miningdedidarwis
 
Tugas Etika Profesi.pptx
Tugas Etika Profesi.pptxTugas Etika Profesi.pptx
Tugas Etika Profesi.pptxSudirman45
 
Proposal pembuatan aplikasi
Proposal pembuatan aplikasiProposal pembuatan aplikasi
Proposal pembuatan aplikasiHIMATIF UIN SGD
 
Konsep Dasar Data Warehouse
Konsep Dasar Data WarehouseKonsep Dasar Data Warehouse
Konsep Dasar Data Warehousededidarwis
 
Pengantar Dan Konsep Keamanan Sistem Informasi
Pengantar Dan Konsep Keamanan Sistem Informasi   Pengantar Dan Konsep Keamanan Sistem Informasi
Pengantar Dan Konsep Keamanan Sistem Informasi Indri Sukmawati Rahayu
 

What's hot (20)

Konsep Data Mining
Konsep Data MiningKonsep Data Mining
Konsep Data Mining
 
PERANCANGAN DAN PEMBUATAN APLIKASI DATAMINING BERBASIS WEB MENGGUNAKAN ALGORI...
PERANCANGAN DAN PEMBUATAN APLIKASI DATAMINING BERBASIS WEB MENGGUNAKAN ALGORI...PERANCANGAN DAN PEMBUATAN APLIKASI DATAMINING BERBASIS WEB MENGGUNAKAN ALGORI...
PERANCANGAN DAN PEMBUATAN APLIKASI DATAMINING BERBASIS WEB MENGGUNAKAN ALGORI...
 
Keamanan sistem operasi
Keamanan sistem operasiKeamanan sistem operasi
Keamanan sistem operasi
 
Data mining 1 pengantar
Data mining 1   pengantarData mining 1   pengantar
Data mining 1 pengantar
 
Contoh laporan kerja praktek ti
Contoh laporan kerja praktek tiContoh laporan kerja praktek ti
Contoh laporan kerja praktek ti
 
02-konsep-data-warehouse.ppt
02-konsep-data-warehouse.ppt02-konsep-data-warehouse.ppt
02-konsep-data-warehouse.ppt
 
Kelompok 2 it forensik
Kelompok 2 it forensikKelompok 2 it forensik
Kelompok 2 it forensik
 
E discovery - tugas 1
E discovery - tugas 1E discovery - tugas 1
E discovery - tugas 1
 
Privasi Online dan Perlindungan Data Pribadi
Privasi Online dan Perlindungan Data PribadiPrivasi Online dan Perlindungan Data Pribadi
Privasi Online dan Perlindungan Data Pribadi
 
Etika dan keamanan dalam teknologi informasi
Etika dan keamanan dalam teknologi informasiEtika dan keamanan dalam teknologi informasi
Etika dan keamanan dalam teknologi informasi
 
Machine learning dan data mining
Machine learning dan data miningMachine learning dan data mining
Machine learning dan data mining
 
Keamanan Informasi dan Perlindungan Data Pribadi
Keamanan Informasi dan Perlindungan Data PribadiKeamanan Informasi dan Perlindungan Data Pribadi
Keamanan Informasi dan Perlindungan Data Pribadi
 
Digital Forensik with Autopsy.pptx
Digital Forensik with Autopsy.pptxDigital Forensik with Autopsy.pptx
Digital Forensik with Autopsy.pptx
 
Proses Data Mining
Proses Data MiningProses Data Mining
Proses Data Mining
 
Tugas Etika Profesi.pptx
Tugas Etika Profesi.pptxTugas Etika Profesi.pptx
Tugas Etika Profesi.pptx
 
Sistem pakar
Sistem pakarSistem pakar
Sistem pakar
 
Proposal pembuatan aplikasi
Proposal pembuatan aplikasiProposal pembuatan aplikasi
Proposal pembuatan aplikasi
 
Konsep Dasar Data Warehouse
Konsep Dasar Data WarehouseKonsep Dasar Data Warehouse
Konsep Dasar Data Warehouse
 
Pengantar Dan Konsep Keamanan Sistem Informasi
Pengantar Dan Konsep Keamanan Sistem Informasi   Pengantar Dan Konsep Keamanan Sistem Informasi
Pengantar Dan Konsep Keamanan Sistem Informasi
 
Kode etik profesi it
Kode etik profesi itKode etik profesi it
Kode etik profesi it
 

Similar to Pengenalan Forensik Digital

Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.cnetworks
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.cnetworks
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...Florence Hudson
 
Digital Forensics Readiness - CommSec
Digital Forensics Readiness - CommSecDigital Forensics Readiness - CommSec
Digital Forensics Readiness - CommSecDarraghCommsec
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfamallblitz0
 
Cyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz AcademyCyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz Academytrashbin306
 
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"sharinblitz
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensiknewbie2019
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicIRJET Journal
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
Accredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowAccredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowSifs India
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...Adam Wyner
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Developmentamiable_indian
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeCSCJournals
 

Similar to Pengenalan Forensik Digital (20)

Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
 
Digital Forensics Readiness - CommSec
Digital Forensics Readiness - CommSecDigital Forensics Readiness - CommSec
Digital Forensics Readiness - CommSec
 
Cyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdfCyber security course in Kerala, Kochi.pdf
Cyber security course in Kerala, Kochi.pdf
 
Cyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz AcademyCyber security course in kerala | C|HFI | Blitz Academy
Cyber security course in kerala | C|HFI | Blitz Academy
 
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Post-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics InvestigationPost-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics Investigation
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Accredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowAccredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register Now
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 

Recently uploaded

Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 

Recently uploaded (20)

Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 

Pengenalan Forensik Digital

  • 1.
  • 2. Yudi  Prayudi   S1  UGM  :  Computer  Graphics   S2  ITS  :  Image  Watermarking  and   Steganography   S3  UGM  (Candidate)  :  Digital  Evidence   Cabinets   •  Koordinator  Konsentrasi  Forensika  Digital,   Magister  Informatika  FTI  UII  Yogyakarta   •  Staff  Pengajar  S2  Akuntansi  Forensik  FE  UII   •  Kepala  Pusat  Studi  Forensika  Digital  (PUSFID)   UII  Yogyakarta   •  Ketua  Bidang  Sertifikasi,  Standarisasi  dan   Akreditasi,  AFDI  (Asosiasi  Forensik  Digital   Indonesia)   •  Chairman  of  HADFEX  (Hacking  and  Digital   Forensics  Exposed)   •  CHFI  ,  Encase,  Oxygen,  Belkasoft,  EnScript   •  Hacker  In  The  Box  (2012),  Hacker  Halted   (2012)  
  • 3. ¡  Ilmu  Forensik     ¡  Forensik  Digital   ¡  Kebutuhan  SDM  Forensik  Digital   ¡  Pendidikan  Forensik  Digital   ¡  Penelitian  Forensik  Digital   ¡  Prospek  Forensik  Digital  di  Indonesia   ¡  Sharing  Knowledge   ¡  Asosiasi  Forensik  Digital  Indonesia  (AFDI)  
  • 4. Forensic  Science  is  any  science  used  for  the   purposes  of  the  law,  and  therefore  provides   impartial  scientific  evidence  for  use  in  the  courts  of   law.   forensic  medicine  is    the  branch  of   medicine  that  interprets  and  establishes   the  medical  facts  in  civil  or  criminal  law   cases  
  • 5. •  Kedokteran  Forensik   •  Akuntansi  Forensik   •  Fotografi  Forensik   •  Psikologi  Forensik   •  Forensik  Bahasa   •  Kimia  Forensik   •  Fisika  Forensik  
  • 6.
  • 7. ¡  "Digital  forensics"  was  originally  simply  data  recovery.   §  “retrieving information that was deleted by mistake or lost during a power surge or server crash” §  Digital  forensics  developed  as  an  independent  field  in  the  late   1990s  and  early  2000s  when  computer  based  crime  started   growing  with  the  increasing  usage  of  computers  and  more  so,   the  Internet.   ¡  Forensics  à  Scientific  Methods.   §  “Digital  Forensics  is  a  branch  of  computer  science  that  focuses  on   developing  evidence  pertaining  to  digital  files  for  use  in  civil  or   criminal  court  proceedings”   §  “Digital  Forensics  is  the  preservation,  identification,  extraction,   interpretation  and  documentation  of  computer  evidence  which   can  be  used  in  the  court  of  law”  
  • 8.
  • 9. ¡  Cyberlaw   ¡  Cybercrime   ¡  Digital  Evidence   ¡  Court   ¡  IT  Policy/Ethics   In legal cases, computer forensic techniques are frequently used to analyze computer systems belonging to defendants (in criminal cases) or litigants (in civil cases).
  • 10.
  • 11.
  • 12. Crime  Scene  Investigation   Akuisisi  dan  Imaging   Eksplorasi  dan  Analisis  Dokumentasi  dan  Presentasi  
  • 13.
  • 14.
  • 15. Objek  Utama  :     Bukti  Elektronik  dan  Bukti  Digital   Aktivitas  Utama  :  Searching   Pertanyaan  Utama  :      What  –  Where  –  When  –  Who  –  Why   and  How  
  • 16. ¡  Computer  Science  Based   §  Arsitektur  Komputer   §  Sistem  Operasi   §  File  System   ¡  Non  Computer  Based   §  Hukum   §  Kriminologi   §  Psikologi   §  Manajemen   §  Akuntansi  
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. One of the fastest growing job markets! 21
  • 22. §  Public-­‐sector   investigations  :  35    %   §  Private-­‐sector   investigations  :    65    %    
  • 23. ¡  Jalur  pencapaian  kompetensi  :     §  Otodidak  à  hacker,  praktisi  security   §  Informal  :     ▪  Vendor    Base  :   ▪  Encase  (EnCE)   ▪  FTK  (ACE)   ▪  Oxygen  (OCE)     ▪  Vendor  Neutral  :     ▪  EC  Council  :  CHFI   ▪  SANS  :  GIAC   ▪  ISC2  :  CCFP  
  • 25. ¡  Jalur  Pencapaian   Kompetensi   §  Formal     ▪  Kuliah  Umum  :     ▪  Penawaran  Matakuliah  :  Ethical   Hacking,  Keamanan  Informasi,   Digital  Forensics   ▪  Konsentrasi  /  Jurusan     ▪  Keamanan  Informasi  /  Komputer   ▪  Magister  Informatika  Konsentrasi   Forensika  Digital  FTI  UII   Yogyakarta.   ­  Matakuliah  Umum  dan  Thesis  :     18  SKS   ­  Matakuliah  Konsentrasi  dan   Pilihan  :  22  Sks   M.Kom  (CHFI,  CEH)   Encase  Academic   Belkasoft  Academic  
  • 26. Latar  Belakang  Pengajar  :     -­‐  Akademisi  Komputer   -­‐  Akademisi  Hukum   -­‐  Praktisi  Penegak  Hukum   -­‐  Praktisi  Private  Investigator   Knowledge  –  Skill  –  Experience     Non  Vendor  Base  Curriculumn     Long  Life  Learning  
  • 27. ¡  digital  forensics  is  a    largely  practitioner-­‐driven   field.   §  Immature Scientific Discipline §  While  many  fields  have  well-­‐defined  research   agendas,  evolution  of  the  field  of  digital  forensics  has     been  largely  driven  by  practitioners  in  the  field.   §   As  a    result,  the  majority  of  the  tools  and  practice   have    been  developed  in  response  to  a  diverse  set  of     specific  threats  or  scenarios,  rather  than  as  the  result     of  a  research  and  development  plan.  
  • 28. Top  Bottom  Research   Secure  and  Trust  Environment  System  for  Digital   Forensics  Investigation  
  • 29. •  Menjadi   platform   penelitian   interdisipliner   yang   melibatkan   dosen  dan  mahasiswa  dalam  upaya  eksplorasi  teori,  metode,   dan   teknik   pada   bidang   digital   forensics,   cybercrime   dan     computer  security  untuk  menghasilkan  berbagai  inovasi  yang   dapat  bermanfaat  bagi  masyarakat  luas.     •  Melakukan   berbagai   aktivitas   layanan   pada   bidang   digital   forensics,   cybercrime   dan     computer   security   baik   dalam   lingkup  institusi  maupun  masyarakat  luas.   •  Menjadi   media   bagi   civitas   akademik   untuk   menjalin   kerjasama   dan   jaringan   dengan   institusi   lain     baik   didalam   didalam   maupun   di   luar   negeri   yang   bergerak   pada   bidang   digital  forensics,  cybercrime  dan    computer  security    
  • 30.
  • 31. Kurikulum   Bahan  Referensi   Lab  Environment   http://catatanforensikadigital.wordpress.com   http://forensics.uii.ac.id    
  • 32.
  • 34.
  • 35. ¡  Dibentuk  17   November  2015   ¡  Keanggotaan  :   Pelajar  dan  Umum   ¡  Tujuan:  memajukan   bidang  forensik   digital  di  Indonesia   melalui  sinergi   berbagai  pihak.  
  • 36. http://hadfex.com   HITB  (Hacker  In  The  Box)   HH  (Hacker  Halted)   DEFCON