SlideShare a Scribd company logo
1 of 37
Yudi	
  Prayudi	
  
S1	
  UGM	
  :	
  Computer	
  Graphics	
  
S2	
  ITS	
  :	
  Image	
  Watermarking	
  and	
  
Steganography	
  
S3	
  UGM	
  (Candidate)	
  :	
  Digital	
  Evidence	
  
Cabinets	
  
•  Koordinator	
  Konsentrasi	
  Forensika	
  Digital,	
  
Magister	
  Informatika	
  FTI	
  UII	
  Yogyakarta	
  
•  Staff	
  Pengajar	
  S2	
  Akuntansi	
  Forensik	
  FE	
  UII	
  
•  Kepala	
  Pusat	
  Studi	
  Forensika	
  Digital	
  (PUSFID)	
  
UII	
  Yogyakarta	
  
•  Ketua	
  Bidang	
  Sertifikasi,	
  Standarisasi	
  dan	
  
Akreditasi,	
  AFDI	
  (Asosiasi	
  Forensik	
  Digital	
  
Indonesia)	
  
•  Chairman	
  of	
  HADFEX	
  (Hacking	
  and	
  Digital	
  
Forensics	
  Exposed)	
  
•  CHFI	
  ,	
  Encase,	
  Oxygen,	
  Belkasoft,	
  EnScript	
  
•  Hacker	
  In	
  The	
  Box	
  (2012),	
  Hacker	
  Halted	
  
(2012)	
  
¡  Ilmu	
  Forensik	
  	
  
¡  Forensik	
  Digital	
  
¡  Kebutuhan	
  SDM	
  Forensik	
  Digital	
  
¡  Pendidikan	
  Forensik	
  Digital	
  
¡  Penelitian	
  Forensik	
  Digital	
  
¡  Prospek	
  Forensik	
  Digital	
  di	
  Indonesia	
  
¡  Sharing	
  Knowledge	
  
¡  Asosiasi	
  Forensik	
  Digital	
  Indonesia	
  (AFDI)	
  
Forensic	
  Science	
  is	
  any	
  science	
  used	
  for	
  the	
  
purposes	
  of	
  the	
  law,	
  and	
  therefore	
  provides	
  
impartial	
  scientific	
  evidence	
  for	
  use	
  in	
  the	
  courts	
  of	
  
law.	
  
forensic	
  medicine	
  is	
  	
  the	
  branch	
  of	
  
medicine	
  that	
  interprets	
  and	
  establishes	
  
the	
  medical	
  facts	
  in	
  civil	
  or	
  criminal	
  law	
  
cases	
  
•  Kedokteran	
  Forensik	
  
•  Akuntansi	
  Forensik	
  
•  Fotografi	
  Forensik	
  
•  Psikologi	
  Forensik	
  
•  Forensik	
  Bahasa	
  
•  Kimia	
  Forensik	
  
•  Fisika	
  Forensik	
  
¡  "Digital	
  forensics"	
  was	
  originally	
  simply	
  data	
  recovery.	
  
§  “retrieving information that was deleted by mistake or lost
during a power surge or server crash”
§  Digital	
  forensics	
  developed	
  as	
  an	
  independent	
  field	
  in	
  the	
  late	
  
1990s	
  and	
  early	
  2000s	
  when	
  computer	
  based	
  crime	
  started	
  
growing	
  with	
  the	
  increasing	
  usage	
  of	
  computers	
  and	
  more	
  so,	
  
the	
  Internet.	
  
¡  Forensics	
  à	
  Scientific	
  Methods.	
  
§  “Digital	
  Forensics	
  is	
  a	
  branch	
  of	
  computer	
  science	
  that	
  focuses	
  on	
  
developing	
  evidence	
  pertaining	
  to	
  digital	
  files	
  for	
  use	
  in	
  civil	
  or	
  
criminal	
  court	
  proceedings”	
  
§  “Digital	
  Forensics	
  is	
  the	
  preservation,	
  identification,	
  extraction,	
  
interpretation	
  and	
  documentation	
  of	
  computer	
  evidence	
  which	
  
can	
  be	
  used	
  in	
  the	
  court	
  of	
  law”	
  
¡  Cyberlaw	
  
¡  Cybercrime	
  
¡  Digital	
  Evidence	
  
¡  Court	
  
¡  IT	
  Policy/Ethics	
  
In legal cases, computer forensic
techniques are frequently used to
analyze computer systems belonging
to defendants (in criminal cases) or
litigants (in civil cases).
Crime	
  Scene	
  Investigation	
   Akuisisi	
  dan	
  Imaging	
  
Eksplorasi	
  dan	
  Analisis	
  Dokumentasi	
  dan	
  Presentasi	
  
Objek	
  Utama	
  :	
  	
  
Bukti	
  Elektronik	
  dan	
  Bukti	
  Digital	
  
Aktivitas	
  Utama	
  :	
  Searching	
  
Pertanyaan	
  Utama	
  :	
  	
  
	
  What	
  –	
  Where	
  –	
  When	
  –	
  Who	
  –	
  Why	
  
and	
  How	
  
¡  Computer	
  Science	
  Based	
  
§  Arsitektur	
  Komputer	
  
§  Sistem	
  Operasi	
  
§  File	
  System	
  
¡  Non	
  Computer	
  Based	
  
§  Hukum	
  
§  Kriminologi	
  
§  Psikologi	
  
§  Manajemen	
  
§  Akuntansi	
  
One of the fastest growing
job markets!
21
§  Public-­‐sector	
  
investigations	
  :	
  35	
  	
  %	
  
§  Private-­‐sector	
  
investigations	
  :	
  	
  65	
  	
  %	
  
	
  
¡  Jalur	
  pencapaian	
  kompetensi	
  :	
  	
  
§  Otodidak	
  à	
  hacker,	
  praktisi	
  security	
  
§  Informal	
  :	
  	
  
▪  Vendor	
  	
  Base	
  :	
  
▪  Encase	
  (EnCE)	
  
▪  FTK	
  (ACE)	
  
▪  Oxygen	
  (OCE)	
  	
  
▪  Vendor	
  Neutral	
  :	
  	
  
▪  EC	
  Council	
  :	
  CHFI	
  
▪  SANS	
  :	
  GIAC	
  
▪  ISC2	
  :	
  CCFP	
  
http://www.tomsitpro.com/articles/computer-­‐forensics-­‐certifications,2-­‐650.html	
  
¡  Jalur	
  Pencapaian	
  
Kompetensi	
  
§  Formal	
  	
  
▪  Kuliah	
  Umum	
  :	
  	
  
▪  Penawaran	
  Matakuliah	
  :	
  Ethical	
  
Hacking,	
  Keamanan	
  Informasi,	
  
Digital	
  Forensics	
  
▪  Konsentrasi	
  /	
  Jurusan	
  	
  
▪  Keamanan	
  Informasi	
  /	
  Komputer	
  
▪  Magister	
  Informatika	
  Konsentrasi	
  
Forensika	
  Digital	
  FTI	
  UII	
  
Yogyakarta.	
  
­  Matakuliah	
  Umum	
  dan	
  Thesis	
  :	
  	
  
18	
  SKS	
  
­  Matakuliah	
  Konsentrasi	
  dan	
  
Pilihan	
  :	
  22	
  Sks	
  
M.Kom	
  (CHFI,	
  CEH)	
  
Encase	
  Academic	
  
Belkasoft	
  Academic	
  
Latar	
  Belakang	
  Pengajar	
  :	
  	
  
-­‐  Akademisi	
  Komputer	
  
-­‐  Akademisi	
  Hukum	
  
-­‐  Praktisi	
  Penegak	
  Hukum	
  
-­‐  Praktisi	
  Private	
  Investigator	
  
Knowledge	
  –	
  Skill	
  –	
  Experience	
  
	
  
Non	
  Vendor	
  Base	
  Curriculumn	
  
	
  
Long	
  Life	
  Learning	
  
¡  digital	
  forensics	
  is	
  a	
  	
  largely	
  practitioner-­‐driven	
  
field.	
  
§  Immature Scientific Discipline
§  While	
  many	
  fields	
  have	
  well-­‐defined	
  research	
  
agendas,	
  evolution	
  of	
  the	
  field	
  of	
  digital	
  forensics	
  has	
  	
  
been	
  largely	
  driven	
  by	
  practitioners	
  in	
  the	
  field.	
  
§  	
  As	
  a	
  	
  result,	
  the	
  majority	
  of	
  the	
  tools	
  and	
  practice	
  
have	
  	
  been	
  developed	
  in	
  response	
  to	
  a	
  diverse	
  set	
  of	
  	
  
specific	
  threats	
  or	
  scenarios,	
  rather	
  than	
  as	
  the	
  result	
  	
  
of	
  a	
  research	
  and	
  development	
  plan.	
  
Top	
  Bottom	
  Research	
  
Secure	
  and	
  Trust	
  Environment	
  System	
  for	
  Digital	
  
Forensics	
  Investigation	
  
•  Menjadi	
   platform	
   penelitian	
   interdisipliner	
   yang	
   melibatkan	
  
dosen	
  dan	
  mahasiswa	
  dalam	
  upaya	
  eksplorasi	
  teori,	
  metode,	
  
dan	
   teknik	
   pada	
   bidang	
   digital	
   forensics,	
   cybercrime	
   dan	
  	
  
computer	
  security	
  untuk	
  menghasilkan	
  berbagai	
  inovasi	
  yang	
  
dapat	
  bermanfaat	
  bagi	
  masyarakat	
  luas.	
  	
  
•  Melakukan	
   berbagai	
   aktivitas	
   layanan	
   pada	
   bidang	
   digital	
  
forensics,	
   cybercrime	
   dan	
   	
   computer	
   security	
   baik	
   dalam	
  
lingkup	
  institusi	
  maupun	
  masyarakat	
  luas.	
  
•  Menjadi	
   media	
   bagi	
   civitas	
   akademik	
   untuk	
   menjalin	
  
kerjasama	
   dan	
   jaringan	
   dengan	
   institusi	
   lain	
   	
   baik	
   didalam	
  
didalam	
   maupun	
   di	
   luar	
   negeri	
   yang	
   bergerak	
   pada	
   bidang	
  
digital	
  forensics,	
  cybercrime	
  dan	
  	
  computer	
  security	
  	
  
Kurikulum	
  
Bahan	
  Referensi	
  
Lab	
  Environment	
  
http://catatanforensikadigital.wordpress.com	
  
http://forensics.uii.ac.id	
  
	
  
Digital	
  Forensics	
  ECOSYSTEM	
  
¡  Dibentuk	
  17	
  
November	
  2015	
  
¡  Keanggotaan	
  :	
  
Pelajar	
  dan	
  Umum	
  
¡  Tujuan:	
  memajukan	
  
bidang	
  forensik	
  
digital	
  di	
  Indonesia	
  
melalui	
  sinergi	
  
berbagai	
  pihak.	
  
http://hadfex.com	
  
HITB	
  (Hacker	
  In	
  The	
  Box)	
  
HH	
  (Hacker	
  Halted)	
  
DEFCON	
  
Pengenalan Forensik Digital

More Related Content

What's hot

PROTOTYPE SMART HOME DENGAN KONSEP INTERNET OF THING (IOT) MENGGUNAKAN ARDUIN...
PROTOTYPE SMART HOME DENGAN KONSEP INTERNET OF THING (IOT) MENGGUNAKAN ARDUIN...PROTOTYPE SMART HOME DENGAN KONSEP INTERNET OF THING (IOT) MENGGUNAKAN ARDUIN...
PROTOTYPE SMART HOME DENGAN KONSEP INTERNET OF THING (IOT) MENGGUNAKAN ARDUIN...Uofa_Unsada
 
Proposal penawaran aplikasi ujian online
Proposal penawaran aplikasi ujian onlineProposal penawaran aplikasi ujian online
Proposal penawaran aplikasi ujian onlinekaji patik
 
Tugas 5 - MPPL - Project Charter
Tugas  5 - MPPL -  Project CharterTugas  5 - MPPL -  Project Charter
Tugas 5 - MPPL - Project CharterRaden Kusuma
 
M05 metode komputer forensik
M05  metode komputer forensikM05  metode komputer forensik
M05 metode komputer forensikHafiz312
 
Contoh laporan kerja praktek ti
Contoh laporan kerja praktek tiContoh laporan kerja praktek ti
Contoh laporan kerja praktek tialvinsadega
 
Sistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDFSistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDFNurdin Al-Azies
 
Latihan Soal Nubneting Jaringan Komputer
Latihan Soal Nubneting Jaringan KomputerLatihan Soal Nubneting Jaringan Komputer
Latihan Soal Nubneting Jaringan KomputerSimon Patabang
 
Manajemen Resiko (Tugas RPL)
 Manajemen Resiko (Tugas RPL)  Manajemen Resiko (Tugas RPL)
Manajemen Resiko (Tugas RPL) viiasilviaa
 
LAPORAN TUGAS AKHIR PERANCANGAN APLIKASI KNOWLEDGE BASE SYSTEM UNTUK INSTRUKS...
LAPORAN TUGAS AKHIR PERANCANGAN APLIKASI KNOWLEDGE BASE SYSTEM UNTUK INSTRUKS...LAPORAN TUGAS AKHIR PERANCANGAN APLIKASI KNOWLEDGE BASE SYSTEM UNTUK INSTRUKS...
LAPORAN TUGAS AKHIR PERANCANGAN APLIKASI KNOWLEDGE BASE SYSTEM UNTUK INSTRUKS...Uofa_Unsada
 
Erd sistem informasi akademik
Erd sistem informasi akademikErd sistem informasi akademik
Erd sistem informasi akademikDiyat Diyat
 
Proposal penawaran aplikasi tracking pengiriman barang
Proposal penawaran aplikasi tracking pengiriman barangProposal penawaran aplikasi tracking pengiriman barang
Proposal penawaran aplikasi tracking pengiriman barangTrastian Wibowo
 
Proposal pembuatan aplikasi
Proposal pembuatan aplikasiProposal pembuatan aplikasi
Proposal pembuatan aplikasiHIMATIF UIN SGD
 
Socket Programming UDP Echo Client Server (Python)
Socket Programming  UDP Echo Client Server  (Python)Socket Programming  UDP Echo Client Server  (Python)
Socket Programming UDP Echo Client Server (Python)Lusiana Diyan
 
Presentasi E- commerce
Presentasi E- commercePresentasi E- commerce
Presentasi E- commerceImam tantowi
 
Aplikasi sistem informasi akademik berbasis desktop
Aplikasi sistem informasi akademik berbasis desktopAplikasi sistem informasi akademik berbasis desktop
Aplikasi sistem informasi akademik berbasis desktopAriestya Permana
 
Internet of things
Internet of  thingsInternet of  things
Internet of thingsTri Martono
 
Keamanan Virtualisasi dalam Cloud Computing
Keamanan Virtualisasi dalam Cloud ComputingKeamanan Virtualisasi dalam Cloud Computing
Keamanan Virtualisasi dalam Cloud ComputingAhmad ZA
 

What's hot (20)

PROTOTYPE SMART HOME DENGAN KONSEP INTERNET OF THING (IOT) MENGGUNAKAN ARDUIN...
PROTOTYPE SMART HOME DENGAN KONSEP INTERNET OF THING (IOT) MENGGUNAKAN ARDUIN...PROTOTYPE SMART HOME DENGAN KONSEP INTERNET OF THING (IOT) MENGGUNAKAN ARDUIN...
PROTOTYPE SMART HOME DENGAN KONSEP INTERNET OF THING (IOT) MENGGUNAKAN ARDUIN...
 
Proposal penawaran aplikasi ujian online
Proposal penawaran aplikasi ujian onlineProposal penawaran aplikasi ujian online
Proposal penawaran aplikasi ujian online
 
Disk forensik
Disk forensikDisk forensik
Disk forensik
 
Tugas 5 - MPPL - Project Charter
Tugas  5 - MPPL -  Project CharterTugas  5 - MPPL -  Project Charter
Tugas 5 - MPPL - Project Charter
 
02 teknik penyerangan
02 teknik penyerangan02 teknik penyerangan
02 teknik penyerangan
 
M05 metode komputer forensik
M05  metode komputer forensikM05  metode komputer forensik
M05 metode komputer forensik
 
Contoh laporan kerja praktek ti
Contoh laporan kerja praktek tiContoh laporan kerja praktek ti
Contoh laporan kerja praktek ti
 
Sistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDFSistem Keamanan Komputer.PDF
Sistem Keamanan Komputer.PDF
 
Latihan Soal Nubneting Jaringan Komputer
Latihan Soal Nubneting Jaringan KomputerLatihan Soal Nubneting Jaringan Komputer
Latihan Soal Nubneting Jaringan Komputer
 
Manajemen Resiko (Tugas RPL)
 Manajemen Resiko (Tugas RPL)  Manajemen Resiko (Tugas RPL)
Manajemen Resiko (Tugas RPL)
 
LAPORAN TUGAS AKHIR PERANCANGAN APLIKASI KNOWLEDGE BASE SYSTEM UNTUK INSTRUKS...
LAPORAN TUGAS AKHIR PERANCANGAN APLIKASI KNOWLEDGE BASE SYSTEM UNTUK INSTRUKS...LAPORAN TUGAS AKHIR PERANCANGAN APLIKASI KNOWLEDGE BASE SYSTEM UNTUK INSTRUKS...
LAPORAN TUGAS AKHIR PERANCANGAN APLIKASI KNOWLEDGE BASE SYSTEM UNTUK INSTRUKS...
 
Erd sistem informasi akademik
Erd sistem informasi akademikErd sistem informasi akademik
Erd sistem informasi akademik
 
Proposal penawaran aplikasi tracking pengiriman barang
Proposal penawaran aplikasi tracking pengiriman barangProposal penawaran aplikasi tracking pengiriman barang
Proposal penawaran aplikasi tracking pengiriman barang
 
Proposal pembuatan aplikasi
Proposal pembuatan aplikasiProposal pembuatan aplikasi
Proposal pembuatan aplikasi
 
Socket Programming UDP Echo Client Server (Python)
Socket Programming  UDP Echo Client Server  (Python)Socket Programming  UDP Echo Client Server  (Python)
Socket Programming UDP Echo Client Server (Python)
 
Presentasi E- commerce
Presentasi E- commercePresentasi E- commerce
Presentasi E- commerce
 
Aplikasi sistem informasi akademik berbasis desktop
Aplikasi sistem informasi akademik berbasis desktopAplikasi sistem informasi akademik berbasis desktop
Aplikasi sistem informasi akademik berbasis desktop
 
Internet of things
Internet of  thingsInternet of  things
Internet of things
 
Keamanan Virtualisasi dalam Cloud Computing
Keamanan Virtualisasi dalam Cloud ComputingKeamanan Virtualisasi dalam Cloud Computing
Keamanan Virtualisasi dalam Cloud Computing
 
Web Service
Web ServiceWeb Service
Web Service
 

Similar to Pengenalan Forensik Digital

Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.cnetworks
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.cnetworks
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...Florence Hudson
 
Digital Forensics Readiness - CommSec
Digital Forensics Readiness - CommSecDigital Forensics Readiness - CommSec
Digital Forensics Readiness - CommSecDarraghCommsec
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensiknewbie2019
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicIRJET Journal
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
Accredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowAccredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowSifs India
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...Adam Wyner
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Developmentamiable_indian
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeCSCJournals
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 

Similar to Pengenalan Forensik Digital (20)

Computer Forensics.pptx
Computer Forensics.pptxComputer Forensics.pptx
Computer Forensics.pptx
 
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.Codec Networks Providing Courses in Cyber forensic,Network Forensics.
Codec Networks Providing Courses in Cyber forensic,Network Forensics.
 
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.Codec Networks Offering Courses in Cyber forensic in Delhi,India.
Codec Networks Offering Courses in Cyber forensic in Delhi,India.
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
 
Digital Forensics Readiness - CommSec
Digital Forensics Readiness - CommSecDigital Forensics Readiness - CommSec
Digital Forensics Readiness - CommSec
 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Post-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics InvestigationPost-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics Investigation
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Accredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register NowAccredited Forensic Courses online. Register Now
Accredited Forensic Courses online. Register Now
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
Towards Research-driven curricula for Law and Computer Science - Wyner and Pa...
 
Computer forencis
Computer forencisComputer forencis
Computer forencis
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 

Recently uploaded

Business Analytics using Microsoft Excel
Business Analytics using Microsoft ExcelBusiness Analytics using Microsoft Excel
Business Analytics using Microsoft Excelysmaelreyes
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一F La
 
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...ttt fff
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...GQ Research
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
办理(UC毕业证书)堪培拉大学毕业证成绩单原版一比一
办理(UC毕业证书)堪培拉大学毕业证成绩单原版一比一办理(UC毕业证书)堪培拉大学毕业证成绩单原版一比一
办理(UC毕业证书)堪培拉大学毕业证成绩单原版一比一z xss
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024Susanna-Assunta Sansone
 

Recently uploaded (20)

Business Analytics using Microsoft Excel
Business Analytics using Microsoft ExcelBusiness Analytics using Microsoft Excel
Business Analytics using Microsoft Excel
 
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
办理(UWIC毕业证书)英国卡迪夫城市大学毕业证成绩单原版一比一
 
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
毕业文凭制作#回国入职#diploma#degree美国加州州立大学北岭分校毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#de...
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
Biometric Authentication: The Evolution, Applications, Benefits and Challenge...
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
办理(UC毕业证书)堪培拉大学毕业证成绩单原版一比一
办理(UC毕业证书)堪培拉大学毕业证成绩单原版一比一办理(UC毕业证书)堪培拉大学毕业证成绩单原版一比一
办理(UC毕业证书)堪培拉大学毕业证成绩单原版一比一
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
FAIR, FAIRsharing, FAIR Cookbook and ELIXIR - Sansone SA - Boston 2024
 

Pengenalan Forensik Digital

  • 1.
  • 2. Yudi  Prayudi   S1  UGM  :  Computer  Graphics   S2  ITS  :  Image  Watermarking  and   Steganography   S3  UGM  (Candidate)  :  Digital  Evidence   Cabinets   •  Koordinator  Konsentrasi  Forensika  Digital,   Magister  Informatika  FTI  UII  Yogyakarta   •  Staff  Pengajar  S2  Akuntansi  Forensik  FE  UII   •  Kepala  Pusat  Studi  Forensika  Digital  (PUSFID)   UII  Yogyakarta   •  Ketua  Bidang  Sertifikasi,  Standarisasi  dan   Akreditasi,  AFDI  (Asosiasi  Forensik  Digital   Indonesia)   •  Chairman  of  HADFEX  (Hacking  and  Digital   Forensics  Exposed)   •  CHFI  ,  Encase,  Oxygen,  Belkasoft,  EnScript   •  Hacker  In  The  Box  (2012),  Hacker  Halted   (2012)  
  • 3. ¡  Ilmu  Forensik     ¡  Forensik  Digital   ¡  Kebutuhan  SDM  Forensik  Digital   ¡  Pendidikan  Forensik  Digital   ¡  Penelitian  Forensik  Digital   ¡  Prospek  Forensik  Digital  di  Indonesia   ¡  Sharing  Knowledge   ¡  Asosiasi  Forensik  Digital  Indonesia  (AFDI)  
  • 4. Forensic  Science  is  any  science  used  for  the   purposes  of  the  law,  and  therefore  provides   impartial  scientific  evidence  for  use  in  the  courts  of   law.   forensic  medicine  is    the  branch  of   medicine  that  interprets  and  establishes   the  medical  facts  in  civil  or  criminal  law   cases  
  • 5. •  Kedokteran  Forensik   •  Akuntansi  Forensik   •  Fotografi  Forensik   •  Psikologi  Forensik   •  Forensik  Bahasa   •  Kimia  Forensik   •  Fisika  Forensik  
  • 6.
  • 7. ¡  "Digital  forensics"  was  originally  simply  data  recovery.   §  “retrieving information that was deleted by mistake or lost during a power surge or server crash” §  Digital  forensics  developed  as  an  independent  field  in  the  late   1990s  and  early  2000s  when  computer  based  crime  started   growing  with  the  increasing  usage  of  computers  and  more  so,   the  Internet.   ¡  Forensics  à  Scientific  Methods.   §  “Digital  Forensics  is  a  branch  of  computer  science  that  focuses  on   developing  evidence  pertaining  to  digital  files  for  use  in  civil  or   criminal  court  proceedings”   §  “Digital  Forensics  is  the  preservation,  identification,  extraction,   interpretation  and  documentation  of  computer  evidence  which   can  be  used  in  the  court  of  law”  
  • 8.
  • 9. ¡  Cyberlaw   ¡  Cybercrime   ¡  Digital  Evidence   ¡  Court   ¡  IT  Policy/Ethics   In legal cases, computer forensic techniques are frequently used to analyze computer systems belonging to defendants (in criminal cases) or litigants (in civil cases).
  • 10.
  • 11.
  • 12. Crime  Scene  Investigation   Akuisisi  dan  Imaging   Eksplorasi  dan  Analisis  Dokumentasi  dan  Presentasi  
  • 13.
  • 14.
  • 15. Objek  Utama  :     Bukti  Elektronik  dan  Bukti  Digital   Aktivitas  Utama  :  Searching   Pertanyaan  Utama  :      What  –  Where  –  When  –  Who  –  Why   and  How  
  • 16. ¡  Computer  Science  Based   §  Arsitektur  Komputer   §  Sistem  Operasi   §  File  System   ¡  Non  Computer  Based   §  Hukum   §  Kriminologi   §  Psikologi   §  Manajemen   §  Akuntansi  
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. One of the fastest growing job markets! 21
  • 22. §  Public-­‐sector   investigations  :  35    %   §  Private-­‐sector   investigations  :    65    %    
  • 23. ¡  Jalur  pencapaian  kompetensi  :     §  Otodidak  à  hacker,  praktisi  security   §  Informal  :     ▪  Vendor    Base  :   ▪  Encase  (EnCE)   ▪  FTK  (ACE)   ▪  Oxygen  (OCE)     ▪  Vendor  Neutral  :     ▪  EC  Council  :  CHFI   ▪  SANS  :  GIAC   ▪  ISC2  :  CCFP  
  • 25. ¡  Jalur  Pencapaian   Kompetensi   §  Formal     ▪  Kuliah  Umum  :     ▪  Penawaran  Matakuliah  :  Ethical   Hacking,  Keamanan  Informasi,   Digital  Forensics   ▪  Konsentrasi  /  Jurusan     ▪  Keamanan  Informasi  /  Komputer   ▪  Magister  Informatika  Konsentrasi   Forensika  Digital  FTI  UII   Yogyakarta.   ­  Matakuliah  Umum  dan  Thesis  :     18  SKS   ­  Matakuliah  Konsentrasi  dan   Pilihan  :  22  Sks   M.Kom  (CHFI,  CEH)   Encase  Academic   Belkasoft  Academic  
  • 26. Latar  Belakang  Pengajar  :     -­‐  Akademisi  Komputer   -­‐  Akademisi  Hukum   -­‐  Praktisi  Penegak  Hukum   -­‐  Praktisi  Private  Investigator   Knowledge  –  Skill  –  Experience     Non  Vendor  Base  Curriculumn     Long  Life  Learning  
  • 27. ¡  digital  forensics  is  a    largely  practitioner-­‐driven   field.   §  Immature Scientific Discipline §  While  many  fields  have  well-­‐defined  research   agendas,  evolution  of  the  field  of  digital  forensics  has     been  largely  driven  by  practitioners  in  the  field.   §   As  a    result,  the  majority  of  the  tools  and  practice   have    been  developed  in  response  to  a  diverse  set  of     specific  threats  or  scenarios,  rather  than  as  the  result     of  a  research  and  development  plan.  
  • 28. Top  Bottom  Research   Secure  and  Trust  Environment  System  for  Digital   Forensics  Investigation  
  • 29. •  Menjadi   platform   penelitian   interdisipliner   yang   melibatkan   dosen  dan  mahasiswa  dalam  upaya  eksplorasi  teori,  metode,   dan   teknik   pada   bidang   digital   forensics,   cybercrime   dan     computer  security  untuk  menghasilkan  berbagai  inovasi  yang   dapat  bermanfaat  bagi  masyarakat  luas.     •  Melakukan   berbagai   aktivitas   layanan   pada   bidang   digital   forensics,   cybercrime   dan     computer   security   baik   dalam   lingkup  institusi  maupun  masyarakat  luas.   •  Menjadi   media   bagi   civitas   akademik   untuk   menjalin   kerjasama   dan   jaringan   dengan   institusi   lain     baik   didalam   didalam   maupun   di   luar   negeri   yang   bergerak   pada   bidang   digital  forensics,  cybercrime  dan    computer  security    
  • 30.
  • 31. Kurikulum   Bahan  Referensi   Lab  Environment   http://catatanforensikadigital.wordpress.com   http://forensics.uii.ac.id    
  • 32.
  • 34.
  • 35. ¡  Dibentuk  17   November  2015   ¡  Keanggotaan  :   Pelajar  dan  Umum   ¡  Tujuan:  memajukan   bidang  forensik   digital  di  Indonesia   melalui  sinergi   berbagai  pihak.  
  • 36. http://hadfex.com   HITB  (Hacker  In  The  Box)   HH  (Hacker  Halted)   DEFCON