Forensik Digital

Please download to get full document.

View again

of 3
8 views
DOCX
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Document Description
Semoga bermanfaat
Document Share
Document Tags
Document Transcript
  The Basics of Digital Forensics Handbock of digital forensics and investigation Komputer Forensik Asal Kata Forensik    Asal kata forensis (latin): Dari luar    Serumpun dengan kata forum yang berarti tempat umum    Forensic (inggris); terkait dengan kehakiman    Ilmu forensic: penggunaan ilmu pengetahuan untuk memecahkan permasalahan hukum. Sejarah Forensic    Francis Galton (1822-1911); sidik jari    Leone Lattes (1887-1954); Golongan darah (A,B,AB, dan O)    Calvin Goddard (1891-1955); Senjata dan peluru (Balistik)    Albert Osborn (1858-1946); Document Examination    Hans Gross (1847-1915); Menerapkan ilmiah dalam investigasi criminal    FBI (1932); Lab, Forensik Sampai Akhir abad ke-19; pemecahan kasus bergantung kepada keterangan dan pengakuan  para saksi Akhir abad ke-19; pengembangan teori sidik jari, tidak ada 2 orang yang memiliki sidik jari yang sama. 1901; Sistem pengelompokan golongan darah ABO, pembedaan sample darah manusia dan hewan. 1910;Teori Locard’s Exchange:”Every contact leaves a trace”, Sering dijadikan acuan forensik.  Digital Forensics    Disk Forensics o   File Recovery o   Acces/Modification identifications o   Log Analysis    System Forensics     Network Forensics    Multimedia Forensics    Mobile System Forensics    Distributed/Embedded System Organization/Association    FBI    International Society of Forensic Computer Examiners    The Computers Investigations and Forensics Branch    Regional Computer Forensics Laboratory National Program Office  Network Investigation Hacker have many attack options at their disposal when it comes to attacking a network.    Vulnerabilities in the technology o   Software o   Hardware    Weaknesses o   Password o   Social Enginering  Network Attacking    Distributed Denial of Service (DDoS)    Identity Spoofing (IP Spoofing)    Man in the Middle Attack     In a social angineering attack Digital Evidences in Network Environment    Logs    Volatile    Fitur dari perangkat    Acces Attemps blocked    Routers    Cisco Core Dumps     NetFlow    Authentication servers o   RADIUS (Remote Authentication Dial In User Service) o   Terminal Acces Controller Access-Control System (TACACS)    Logs from RADIUS and TACACS Servers    VPNs are often configured to authenticate via RADIUS or Active Directory.  Network INvestigation Sytem    Tcdump     Ngrep    Wireshark (www.wiheshark)
Search Related
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks