Digital Forensics and Cyber Investigation
1,594 Followers
Recent papers in Digital Forensics and Cyber Investigation
Crimes committed within electronic or digital domains, particularly within cyberspace, have become extremely common these days. Criminals are using technology to a great extent in committing various digital offences and creating new... more
The computer is being used by majority of the people living today. There are linked to the computer either directly or indirectly. The computer systems are gaining their implementations in different departments. Either it is education or... more
This is the only forensic-qualified tool for examinination of optical media. It has been around since 1999 and is in use by law enforcement, government and data recovery companies worldwide.
Data mining technology is applied to fraud detection to establish the fraud detection model, describe the process of creating the fraud detection model, then establish data model with ID3 decision tree, and establish example of fraud... more
The purpose of this study is to explore the evolving technology and systems to find a low cost, efficient and portable solution for hard disk drive forensic imaging.Hard Disk Drive Imaging is one of the most frequently used forensic... more
Many a times, it has been argued that over dependency on technology leads to deskilling, lack of innovation and creativity thus resulting in inferior or substandard work. With a field growing in both demand for personnel and market for... more
Bellingcat’s Digital Forensics Tools
A List of Open Source Verification and Investigation Tools and Methods
A List of Open Source Verification and Investigation Tools and Methods
completely equipped to assimilate the detailed and complicated technical aspects of video forensics. Keywords Video forgery detection · Video tamper detection · Passive-blind video forensics · Video anti-forensics · Video content... more
Forensics from volatile memory plays an important role in the investigation of cybercrime. The acquisition of RAM memory or other terms of RAM dump can assist forensic investigators in retrieving much of the information related to crime.... more
As we have seen several versions of Shamoon malware like 2 and 3 Generation , the fourth version has been spread, but it did not was famous like version 3 . In this paper i will analyze the Shamoon 4 malware , which may be the next target... more
LAPORAN PRAKTIKUM DIGITAL FORENSIC TENTANG ANALISIS KASUS NARKOBA
MATA KULIAH DIGITAL FORENSIC
MATA KULIAH DIGITAL FORENSIC
Information security management (ISM) is an important endeavour in today’s world where data and information are now critical assets of businesses and government. The purpose of this study was to conduct an empirical exploration and... more
Email merupakan salah satu fasilitas internet yang banyak digunakan untuk komunikasi dan bertukar informasi. Hal ini memungkinkan pihak ketiga menyalahgunakan email untuk mendapatkan informasi secara ilegal dengan mengubah identitas... more
There has been a wide usage of anti-computer forensics all over the world. This paper takes an overview of, and an analysis of the most widely used anti-forensic techniques in the world. Mostly, these techniques hide or make it... more
In recent times, most of the data such as books, personal materials and genetic information digitally. This transformation gives rise to a field of Cyberspace. This newly created space, gave rise to a new set of crime Cybercrime, this... more
La facilità tecnica ed economica di creare un deepfake rende opportuno modificare l'approccio alle regole che disciplinano l'efficacia probatoria dei documenti informatici. L'esame di alcune ipotesi di prova consistente in una... more
With the increase in technology over the past 30 years, the digital and computer fields have been booming with new ways to harness data and organize someone’s life. Smart devices have become an everyday convenience for millions... more
Malware is currently growing rapidly, diverse and complex. But, human resources that can carry out malware analysis is limited, because special expertise is needed. Reverse engineering is one of many solution that can carry out malware... more
The probability of having sensitive information retrieved from secondhand IoT devices has increased, even though the previous user removed data and deleted apps in those IoT devices. Due to the increase in flash memory storage technology,... more
In the wake of widespread proliferation of inexpensive and easy-to-use digital content editing software, digital videos have lost the idealized reputation they once held as universal, objective and infallible evidence of occurrence of... more
Digital vision technologies emerged exponentially in all living areas to watch, play, control, or track events. Security checkpoints have benefited also from those technologies by integrating dedicated cameras in studied locations. The... more
The old adage, "seeing is believing", no longer holds true in modern society. Digital media has paved the way for anyone to doctor images and for videos to misrepresent truth. The lines between fact, entertainment, advertising,... more
Pasal 35 : Setiap Orang dengan sengaja dan tanpa hak atau melawan hukum melakukan manipulasi, penciptaan, perubahan, penghilangan, pengrusakan Informasi Elektronik dan/atau Dokumen Elektronik dengan tujuan agar Informasi Elektronik... more
Over the years researchers have proposed and developed models for extraction of digital evidence in mobile devices but little has been done on standardization of these models hence leading to inconsistencies in the extraction process used... more
This paper presents a robust signature verification and forgery detection system using Additive fuzzy and TS modeling technique. The features of various handwritten signatures are sampled with proper analysis and encapsulated to devise an... more
With the growing number of digital forensic tools and the increasing use of digital forensics in various contexts, including incident response and cyber threat intelligence, there is a pressing need for a widely accepted standard for... more
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given media,... more
In this digital day and age, we are becoming increasingly dependent on multimedia content, especially digital images and videos, to provide a reliable proof of occurrence of events. However, the availability of several sophisticated yet... more
Digital vision technologies emerged exponentially in all living areas to watch, play, control, or track events. Security checkpoints have benefited also from those technologies by integrating dedicated cameras in studied locations. The... more
Abstrak Malware merupakan salah satu bentuk dari kejahatan komputer yang terjadi pada sebuah sistem jaringan komputer, malware Njrat termasuk jenis Trojan horse. Trojan adalah salah satu jenis malware yang ikut berkembang di dalamnya,... more
This paper covers the different aspects of computer forensics analyst job detailing what they are usually tasked with.
The eternal preoccupation with multimedia technology is the precursor of us becoming a civilization replete with astonishing miscellanea of digital audio-visual information. Not so long ago, this digital information (images and videos... more
Roman playwright Plautus once said, “One eyewitness weights more than ten hearsays – seeing is believing, all the world over.” The tendency to trust the evidence of our eyes is a biological predilection, and it applies not only to the... more
Gaurav, a petroleum engineer, worked for Green Oil (names have been changed to maintain confidentiality and privacy) and was in possession of highly classified and critical data relating to research carried out by the company. Gaurav... more