digital forensic
Recently Published Documents


TOTAL DOCUMENTS

872
(FIVE YEARS 296)

H-INDEX

23
(FIVE YEARS 4)

2022 ◽  
Vol 12 (2) ◽  
pp. 730
Author(s):  
Funmilola Ikeolu Fagbola ◽  
Hein Venter

Internet of Things (IoT) is the network of physical objects for communication and data sharing. However, these devices can become shadow IoT devices when they connect to an existing network without the knowledge of the organization’s Information Technology team. More often than not, when shadow devices connect to a network, their inherent vulnerabilities are easily exploited by an adversary and all traces are removed after the attack or criminal activity. Hence, shadow connections pose a challenge for both security and forensic investigations. In this respect, a forensic readiness model for shadow device-inclusive networks is sorely needed for the purposes of forensic evidence gathering and preparedness, should a security or privacy breach occur. However, the hidden nature of shadow IoT devices does not facilitate the effective adoption of the most conventional digital and IoT forensic methods for capturing and preserving potential forensic evidence that might emanate from shadow devices in a network. Therefore, this paper aims to develop a conceptual model for smart digital forensic readiness of organizations with shadow IoT devices. This model will serve as a prototype for IoT device identification, IoT device monitoring, as well as digital potential evidence capturing and preservation for forensic readiness.


2022 ◽  
Vol 6 (2) ◽  
pp. 265
Author(s):  
Wishnu Agung Baroto

Email is an imperative method of communication that is changing the way people share their data and information. It provides effective and efficient communication, especially in business, convenience, and easy access and replication. Those electronic data should be considered by a fraud investigator to comprehend the investigation. Email can be divided into two parts: the head of the email and the email body. The head of the email is metadata that consists of unstructured data, and the body and its attachment consist of semi-structured data. The email data usually comes in large volumes and ranges of types. Therefore, a manual investigation of an email should be avoided. This paper uses the Design Science Research Methodology to discover the most profound framework in an email fraud investigation. Using email metadata and email body, this research performs a digital forensic framework: preparation, gathering, processing, and presentation, combines with social network analysis to be applicable in the investigation. The result shows that digital forensics process, network analysis, data visualization provides a more valuable and comprehensive insight into email analysis.


Author(s):  
Anand Desai ◽  
Siddhesh Masurkar

With the advancement and growing science of technology and the internet, the threats to data and digital devices have been increasing due to hackers and data invigilators. So the branch of DIGITAL FORENSIC has been set up for the investigation of the cybercrimes committed through the means of the internet, network, digital devices, etc. There are millions of internet users worldwide who are targeted by these hackers, and they lose their data to these data thieves unknowingly. This data can be misused by cybercriminals for various purposes. This branch of forensic science tracks and investigates these cyber criminals and finds the appropriate evidence against them. This paper surveys the work of this branch gives you a brief explanation about the various sub-branches, job opportunities available, and several tools used in this investigation process.


Cryptographic hash functions are which transform any long message to fixed-length data. It seeks to ensure the confidentiality of the data through the cryptographic hash. The digital forensic tool is a method for extracting information from various storage devices, such as hard drives, memory. SHA-1 and SHA-2 methods are both widely used in forensic image archives. The hash method is usually used during evidence processing, the checking of forensic images (duplicate evidence), then at the completion of the analysis again to ensure data integrity and forensic evaluation of evidence. There was a vulnerability called a collision in the hashing algorithm in which two independent messages had the same hash values. While SHA-3 is secure than its former counterparts, the processors for general purposes are being slow and are not yet so popular. This task proposes a basic yet successful framework to meet the needs of cyber forensics, combining hash functions with other cryptographic concepts, for instance, SALT, such as modified secured hash algorithm (MSHA). A salt applies to the hashing mechanism to make it exclusive, expand its complexity and reduce user attacks like hash tables without increasing user requirements.


Wajah Hukum ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 448
Author(s):  
Wahdah Prasetya ◽  
Puti Priyana

The problems in this research are regulate digital forensic law in proving crime in Indonesia, judges consider the presence of digital forensic evidence in fraud crime. This research uses normative juridical approach, by examining and interpreting matters relating theoretical principles, conceptions, doctrines and legal norms relating to the presence of forensic digital evidence. The result showed that digital Forensic Arrangements in analyzing digital evidence in terms of proving criminal acts are not specifically regulated in the Criminal Procedure Code (KUHAP) because exceptions to electronic / digital evidence are regulated in the Information and Electronic Transaction (ITE) Act so that can be a legal basis for digital forensics. Law No. 11 of 2008 on Information and Electronic Transactions on Article 5 has been clearly stated that electronic information is a valid legal evidence in the form of electronic information and / or electronic documents and / or printout. The rise of data fraud requires a legal arrangement that is expected to be able to prevent and reduce these crimes. For this reason, it is important to elaborate legal arrangements for both implementation and criminal sanctions related to data fraud in Indonesia.


2021 ◽  
Vol 38 ◽  
pp. 301133
Author(s):  
Xiaoyu Du ◽  
Christopher Hargreaves ◽  
John Sheppard ◽  
Mark Scanlon

Sign in / Sign up

Export Citation Format

Share Document