scholarly journals COMPUTER CRIME AND DIGITAL EVIDENCE

Author(s):  
E. Casey
2019 ◽  
Vol 23 (1) ◽  
pp. 123-140
Author(s):  
Oleg A Ostrovsky

Modern information systems, such as e-learning, e-voting, e-health, etc., are often used inappropriately for irregular data changes (data falsification). These facts force to review security measures and find a way to improve them. Proof of computer crime is accompanied by very complex processes that are based on the collection of digital evidence, forensic analysis and investigation. Forensic analysis of database systems is a very specific and complex task and therefore is the main source of inspiration for research. This article presents the fact that classical methods of collecting digital evidence are not suitable and effective. To improve efficiency, a combination of well-known, world-independent database technologies and their application in the field of forensic science are proposed. It also offers new directions for research in this area.


2019 ◽  
Vol 2 (1) ◽  
pp. 39-46
Author(s):  
Krisna Widatama

Nowadays, the computer technology is growing rapidly. This has a positive impact, many people can be helped by the computer. In addition, the types of jobs available are in-creasing. But, there are also negative impacts, for example the computer crimes are growing dramatically. The komputer crimes will be handled where the place of computer crime occurred at the District Level (POLSEK). The problem occurs is when police agen-cies at the District Level do not have tools to investigate digital evidence. So the proce-dure to handle this computer crime is send the physical evidence to the Regional Level (POLDA) to be acquired and analyzed.It will make the digital evidence vulnerable to be acquired and manipulated when the physical evidence is sent to the Regional Police Agency by people who do not have au-thority. It is necessary to renew the procedure for handling digital evidence in the case of a computer crime and integrated system between them.This study will produce a procedure for handling digital evidence through an integrated monitoring system between POLSEK and POLDA agencies. It is hoped that through this monitoring system, authenticity can be maintained and the digital evidence can be ac-cepted by judge in the court.


2003 ◽  
Vol 48 (2) ◽  
pp. 2002313 ◽  
Author(s):  
Judith M. Collins

2019 ◽  
Vol 6 (5) ◽  
pp. 509
Author(s):  
Imam Mahfudl Nasrulloh ◽  
Sunardi Sunardi ◽  
Imam Riadi

<p class="Abstrak">Teknologi komputer pada empat tahun terahir ini mengalami perkembangan yang pesat. Bersamaan dengan itu juga berdampak negatif salah satunya adalah berupa kejahatan komputer. Kejahatan komputer akan meninggalkan jejak aktivitas kejahatan, maka perlu dilakukan analisa dengan ilmu dan metode forensik untuk mendapatkan barang bukti. Bagaimana jika terjadi kejahatan komputer pada media penyimpanan komputer berjenis <em>non-volatile memory</em> dan dilakukan secara <em>live</em> forensik<em>.</em> Pada penelitian ini dilakukan proses forensik pada <em>Solid State Drive</em> <em>(SSD)</em> dengan <em>framework</em> <em>Grr Rapid Response</em> pada kasus kehilangan <em>data (lost data)</em> suatu organisasi. Langkah kerja forensik mengimplementasikan dari <em>National Institute of Standards Technology (NIST).</em><em> Framework</em> <em>Grr Rapid Response</em> digunakan untuk memberikan tanggapan terhadap insiden forensik digital yang difokuskan pada lingkungan forensik jarak jauh, <em>f</em><em>ramework</em> ini berbasis arsitektur <em>client server</em>. Hasil penelitian ini menunjukkan langkah kerja forensik <em>NIST</em> dapat diimplementasikan pada proses pengambilan bukti digital dengan metode akuisisi secara <em>live </em>forensik,  kemampuan <em>tool</em> forensik pada proses eksaminasi <em>Grr Rapid Response</em> pada <em>Workstation (</em><em>Client Grr)</em> dengan media simpan <em>SSD</em><em>,</em> bukti digital dapat ditemukan dan dikembalikan. Bukti digital yang dapat dikembalikan berupa <em>file</em> dokumen, dan hasil validasi pada bukti digital tersebut memiliki nilai <em>hash</em> yang sama dari dua algoritma validasi bukti digital yang diimplementasikan, MD5 dan SHA-1. Sehingga hasil integritas dari dokumen tersebut menunjukkan bahwa bukti digital tersebut identik.</p><p class="Abstrak"> </p><p class="Abstrak"><em><strong>Abstract</strong></em></p><p class="Abstract"><em>Computer technology in the last four years has experienced rapid development. At the same time, it also has a negative impact, one of which is a computer crime. Computer crime will leave traces of criminal activity, so it is necessary to analyze with forensic science and methods to obtain evidence. What if there is a computer crime on a computer storage medium of a type of non-volatile memory and carried out live forensics In this study a forensic process on Solid State Drive (SSD) was carried out with the Grr Rapid Response framework for lost data in an organization. The forensic work step is implemented from the National Institute of Standards Technology (NIST). The Grr Rapid Response Framework is used to provide responses to incidents of digital forensics focused on remote forensic environments, this framework is based on a client server architecture. The results of this study indicate that NIST's forensic work steps can be implemented in the process of taking digital evidence with live forensic acquisition methods, the ability of forensic tools in the Grr Rapid Response examination process on Workstations (Client Grr) with SSD storage media, digital evidence can be found and returned. Digital evidence that can be returned is a document file, and the results of the validation of digital evidence have the same hash value from the two digital proof validation algorithms implemented, MD5 and SHA-1. So the results of the integrity of the document so that the digital evidence is identical.</em></p><p class="Abstrak"><em><strong><br /></strong></em></p>


2019 ◽  
pp. 001-010
Author(s):  
Tino Feri Efendi

Computer crime has 2 types of evidence, namely: physical evidence and digital evidence. Storage on physical evidence requires a special space that can hold physical evidence. However, a system that can store and manage physical evidence is needed.The current problem is the absence of a concept of storing physical evidence and its documentation (Chain of Custody). Management of Physical Evidence is proposed as a solution to solve the problem. This concept is in the form of a Physical Evidence Management System and Chain of Custody by taking the analogy of a Data Inventory. Problems with Physical Evidence Management require a Management System for Physical Evidence that is suitable for use in the UII Digital Forensics Laboratory. This research has successfully implemented the concept of Data Inventory. It is expected that with the concept of Physical Evidence Management the control of physical evidence and all activities related to it can be maintained and documented properly.


Sign in / Sign up

Export Citation Format

Share Document