SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
FUNDAMENTAL OF
DIGITAL FORENSICS
S1 Teknologi Informasi
UNIVERSITAS TEKNOKRAT INDONESIA
Februari 2022
Bandarlampung
By : Jupriyadi
OUTLINE
Forensic and Digital Forensic
Definition
01 03
Digital Evidence
Digital Forensic Model
02 04
Need and Benefit of Digital Forensic
Application of Digital Forensic
Skill Required and Challenges Faced By
Digital Forensic
What is Forensics ... ?
Forensics ... ?
 Collection and analysis of evidence
 Using scientific test or techniques
 To establish fact againts crime
 For presenting in al legal proceeding
 Therefore forensic science is a scientific method of
gathering and examining information about the past which
is then used in court of law
Digital forensic is the use of scientically derived and proven methode
toward:
 the preservation, collection, validation, identification, analysis,
interpretation, documentation, and presentation of digital
evidence derived from digital device
 for the purpose of facilitation or furthering the reconstruction of
events found to be criminal, or helping to anticipate unauthorezed
actions shown to be disruptive to planned operations
Branches of Digital Forensics
• The technical aspect of an investigation is divided into several sub-
branches, relating to the type of digital devices involved:
 Computer forensics, Firewall forensics, database forensics, network
forensics, forensic data analysis and mobile devices forensics
• The typical forensic process encompasses the seizure, forensic
imaging and analysis of digital media and the production of a report
into collected evidence
Examples of Digital Forensic Devices
Digital Evidence ... ???
• Evidence
√ A piece of information that supports a conclusion
• Digital evidence
 Any data that is recorded or preserved on any medium or by a
computer system or other similar digital device, that can be
read or understood by a person or a computer system or other
similar device
 It includes a display, printout or other output of that data
Characteristics of Digital Evidence
An evidence must be:
 Admissible
Conformity with the common law an legislative rules
Authentic
In linking data to specific individuals and events
Fragile
Easy altered, damaged, or destroyed
Accurate
Believed and is consostent
Complete
With a full story of particular ciscumstances
Convinsing to juries
To have probative value, subjective and practical test of
presentation - To proving beyond doubt
Examples of Digital Evidence
 e-mails
 Digital photograps
 ATM transaction logs
 word processing documents
 instant message histories
 files saved from accounting
program
 spreadsheets
 internet browser histories
 databases
 the contents of computer
memory
 computer backups, komputer
printouts
 global positioning system tracks
 log from a hotels electronic door
locks and
 digital video or audio files
Type of Digital Evidence
1. Persistant data
Meaning data that remains intact when the digital device is
turned off. E.g. hard drives, disk drives and removable storage
devices such as USB drives or flash drives).
2. Volatile data
Which is data that would be lost if the digital device is turned off.
E.g. deleted files, computer history, the computers registry,
temporary files and web browsing history
Location for Evidence
1. Internet history files
2. Temporary internet files
3. Slack/Unlocated space
4. Buddy lists, personal chat room records, PTP, other saved areas
5. New groups/club list/posting
6. Setting, folder structure, file names
7. File storages dates
8. Software/hardware added
9. File sharing ability
Different Digital Forensic Models Published
No. Digital forensic model or framwork No of phases
1 Computer forensic process M.Politt, 1995 4 processes
2 Generic Investgative Process Palmer, 2001) 7 clases
3 Abstract model of digital forensic procedure
(Reith, Carr, & Gumsch, 2002)
9 processes
4 An integrated digital investigation process
(Carrier & Spafford, 2003)
17 processes
5 End to end digital investigation (Stephenson,
2003)
9 steps
6 Enhanced integrated digital investigation
process (Baryamureeba & Tushabe, 2004)
21 phases
Different Digital Forensic Models Published
No. Digital forensic model or framwork No of phases
7 Entended model of cybercrime investigation (Ciardhuain,
2004)
13 activities
8 Hierachical, Objective - bases framwork (Beebe Clark,
2004)
6 phases
9 Event based digital forensic investigation framwork
(Carier and Spafoford, 2004)
16 phases
10 Forensic Process (Kent K, Chevalier, Grace Dang, 2006) 4 processes
11 Investigation framework (Kohn, Eloff, & Oriva, 2006) 3 stages
12 Computer forensic field triage process model K. Rogers,
Goldman, Mislan, Wdge, & Debrota, 2006)
4 phases
13 Investigative process model (Freiling & Schawittay, 2007) 4 phases
Digital Forensic Basic Model
Need for Digital Forensic
1. To ensure the integrity of digital system
2. To focus on the response to hi-tech offenses, started to intervene
the system
3. Digital forensics has been efficiently used to track down the
terrorists from the various parts of the world
4. To produce evidence in the courd that can lead to the
punishment of th criminal
The Benefits of Digital Forensic
Digital forensics help to protect from and solve cases involving :
1. Theft of intellectual property
This pertains to any act that allows access to patents, trade
secrets, customer data, and ani confidential information
2. Financial fraud
This pertains to anything that uses fraudulent solicitation of
victims information to conduct fraudulent transactions
The Benefits of Digital Forensic
3. Hacker system penetration
Taking advantage of vulnerabilities of system or software using
tools such as rootkits and sniffers
4. Distribution and execution of viruses and worms
These are the most common forms of cyber crime and often cost
the most damage
Skill Required for Digital Forensic
1. Application of programming or computer-related experience
2. Broad understanding of operating systems and applications
3. Strong analytical skills
4. Strong computer science fundamentals
5. Strong system administrative skills
6. Knowledge of the latest intruder tools
7. Knowledge of cryptography and steganography
8. Strong understanding of the rules of evidence and evidence handling
9. Ability to be an expert witness in a court of law
TERIMAKASIH

Weitere ähnliche Inhalte

Was ist angesagt?

Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
 

Was ist angesagt? (20)

Incident response process
Incident response processIncident response process
Incident response process
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Windows forensic artifacts
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifacts
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

Ähnlich wie Fundamental digital forensik

Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
Rahul Baghla
 

Ähnlich wie Fundamental digital forensik (20)

Digital forensic
Digital forensicDigital forensic
Digital forensic
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Cyber evidence at crime scene
Cyber evidence at crime sceneCyber evidence at crime scene
Cyber evidence at crime scene
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptx
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 

Mehr von newbie2019

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
newbie2019
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 

Mehr von newbie2019 (20)

Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Chapter 14 sql injection
Chapter 14 sql injectionChapter 14 sql injection
Chapter 14 sql injection
 
Chapter 13 web security
Chapter 13 web securityChapter 13 web security
Chapter 13 web security
 
NIST Framework for Information System
NIST Framework for Information SystemNIST Framework for Information System
NIST Framework for Information System
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Chapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutanChapter 8 cryptography lanjutan
Chapter 8 cryptography lanjutan
 
Pertemuan 7 cryptography
Pertemuan 7  cryptographyPertemuan 7  cryptography
Pertemuan 7 cryptography
 
Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)Chapter 6 information hiding (steganography)
Chapter 6 information hiding (steganography)
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
C02
C02C02
C02
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
Chapter 1 introduction
Chapter 1 introductionChapter 1 introduction
Chapter 1 introduction
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 

Kürzlich hochgeladen (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Fundamental digital forensik

  • 1. FUNDAMENTAL OF DIGITAL FORENSICS S1 Teknologi Informasi UNIVERSITAS TEKNOKRAT INDONESIA Februari 2022 Bandarlampung By : Jupriyadi
  • 2. OUTLINE Forensic and Digital Forensic Definition 01 03 Digital Evidence Digital Forensic Model 02 04 Need and Benefit of Digital Forensic Application of Digital Forensic Skill Required and Challenges Faced By Digital Forensic
  • 4. Forensics ... ?  Collection and analysis of evidence  Using scientific test or techniques  To establish fact againts crime  For presenting in al legal proceeding  Therefore forensic science is a scientific method of gathering and examining information about the past which is then used in court of law
  • 5. Digital forensic is the use of scientically derived and proven methode toward:  the preservation, collection, validation, identification, analysis, interpretation, documentation, and presentation of digital evidence derived from digital device  for the purpose of facilitation or furthering the reconstruction of events found to be criminal, or helping to anticipate unauthorezed actions shown to be disruptive to planned operations
  • 6. Branches of Digital Forensics • The technical aspect of an investigation is divided into several sub- branches, relating to the type of digital devices involved:  Computer forensics, Firewall forensics, database forensics, network forensics, forensic data analysis and mobile devices forensics • The typical forensic process encompasses the seizure, forensic imaging and analysis of digital media and the production of a report into collected evidence
  • 7. Examples of Digital Forensic Devices
  • 8. Digital Evidence ... ??? • Evidence √ A piece of information that supports a conclusion • Digital evidence  Any data that is recorded or preserved on any medium or by a computer system or other similar digital device, that can be read or understood by a person or a computer system or other similar device  It includes a display, printout or other output of that data
  • 9. Characteristics of Digital Evidence An evidence must be:  Admissible Conformity with the common law an legislative rules Authentic In linking data to specific individuals and events Fragile Easy altered, damaged, or destroyed Accurate Believed and is consostent Complete With a full story of particular ciscumstances Convinsing to juries To have probative value, subjective and practical test of presentation - To proving beyond doubt
  • 10. Examples of Digital Evidence  e-mails  Digital photograps  ATM transaction logs  word processing documents  instant message histories  files saved from accounting program  spreadsheets  internet browser histories  databases  the contents of computer memory  computer backups, komputer printouts  global positioning system tracks  log from a hotels electronic door locks and  digital video or audio files
  • 11. Type of Digital Evidence 1. Persistant data Meaning data that remains intact when the digital device is turned off. E.g. hard drives, disk drives and removable storage devices such as USB drives or flash drives). 2. Volatile data Which is data that would be lost if the digital device is turned off. E.g. deleted files, computer history, the computers registry, temporary files and web browsing history
  • 12. Location for Evidence 1. Internet history files 2. Temporary internet files 3. Slack/Unlocated space 4. Buddy lists, personal chat room records, PTP, other saved areas 5. New groups/club list/posting 6. Setting, folder structure, file names 7. File storages dates 8. Software/hardware added 9. File sharing ability
  • 13. Different Digital Forensic Models Published No. Digital forensic model or framwork No of phases 1 Computer forensic process M.Politt, 1995 4 processes 2 Generic Investgative Process Palmer, 2001) 7 clases 3 Abstract model of digital forensic procedure (Reith, Carr, & Gumsch, 2002) 9 processes 4 An integrated digital investigation process (Carrier & Spafford, 2003) 17 processes 5 End to end digital investigation (Stephenson, 2003) 9 steps 6 Enhanced integrated digital investigation process (Baryamureeba & Tushabe, 2004) 21 phases
  • 14. Different Digital Forensic Models Published No. Digital forensic model or framwork No of phases 7 Entended model of cybercrime investigation (Ciardhuain, 2004) 13 activities 8 Hierachical, Objective - bases framwork (Beebe Clark, 2004) 6 phases 9 Event based digital forensic investigation framwork (Carier and Spafoford, 2004) 16 phases 10 Forensic Process (Kent K, Chevalier, Grace Dang, 2006) 4 processes 11 Investigation framework (Kohn, Eloff, & Oriva, 2006) 3 stages 12 Computer forensic field triage process model K. Rogers, Goldman, Mislan, Wdge, & Debrota, 2006) 4 phases 13 Investigative process model (Freiling & Schawittay, 2007) 4 phases
  • 16. Need for Digital Forensic 1. To ensure the integrity of digital system 2. To focus on the response to hi-tech offenses, started to intervene the system 3. Digital forensics has been efficiently used to track down the terrorists from the various parts of the world 4. To produce evidence in the courd that can lead to the punishment of th criminal
  • 17. The Benefits of Digital Forensic Digital forensics help to protect from and solve cases involving : 1. Theft of intellectual property This pertains to any act that allows access to patents, trade secrets, customer data, and ani confidential information 2. Financial fraud This pertains to anything that uses fraudulent solicitation of victims information to conduct fraudulent transactions
  • 18. The Benefits of Digital Forensic 3. Hacker system penetration Taking advantage of vulnerabilities of system or software using tools such as rootkits and sniffers 4. Distribution and execution of viruses and worms These are the most common forms of cyber crime and often cost the most damage
  • 19. Skill Required for Digital Forensic 1. Application of programming or computer-related experience 2. Broad understanding of operating systems and applications 3. Strong analytical skills 4. Strong computer science fundamentals 5. Strong system administrative skills 6. Knowledge of the latest intruder tools 7. Knowledge of cryptography and steganography 8. Strong understanding of the rules of evidence and evidence handling 9. Ability to be an expert witness in a court of law