Computer Forensic Lab
Presented by
Sabto Prabowo
4711010010
What is Computer Forensic Lab?
Its a lab/workshop who serve
requirements of a forensic and
what equipment is needed.
Physical Security Needs of a Forensic
Lab
●
Access to emergency services
●
Lighting at the site
●
Physical environment of the lab
●
Structural design of parking
Physical Security Recomendation For
A Lab
Basic Requirements
●
name of the visitor
●
date and time of the visit
●
purpose of the visit
●
name of the official the visitor has come to see
●
place the visitor has come from
●
address of the visitor
Physical Security Recomendation For
A Lab
Workstation Security
Workstations should be shielded from transmitting
electromagnetic signals. It is a known fact that
electronic equipment emits electromagnetic radiation.
There are certain pieces of equipment that can
intercept this radiation.
Fire Safety
Fire can be disastrous in a forensic lab. Any electrical
device can be a source of fire, though this does not
gen erally happen with computers. On a few
occasions, short circuits can also damage cables
These short circuits might even ignite flammable items
close by.
Evidence Locker Recommendation
The containers used to store evidence must be secured
so that unauthorized persons cannot access the
evidence. They should be located in a restricted area
that is only accessible to lab personnel. All evidence
containers must be monitored, and they must be
locked when not in use.
Checking Security of Forensic Lab
• Examine the ceiling, floor, and exterior walls of
the lab at least once a month to check for
structural integrity.
• Examine the doors to ensure they close and lock
correctly.
• Check if the locks are working properly or if they
need to be replaced.
• Examine the log register to make sure all entries
are correct and complete.
• Check the log sheets for evidence containers to
check when the containers were opened and
Work Area in Computer Security Lab
The forensic lab should be built in an area where human
traffic is light. An ideal lab consists of two forensic
workstations and one ordinary workstation with
Internet connectivity. The number of forensic
workstations varies according to the number of cases
and processes handled in the lab.
General Config of Conputer Security
Lab
●
Workstation
●
Uniterruptable Power Supply
●
Bookracks
●
Necessary Software
●
References Materials
●
Safe Locker and Storage shelf
●
LAN and Internet Connectivity
Equipment Required in a Forensic Lab
Common Needs
●
Cabinets
●
Printer and Scanner
●
Additional Hard Drives
●
Tape Drives
Equipment Required in a Forensic Lab
Communication Needs
●
Bandwidth
●
Dial-Up / Broadband Access
●
Local Network
Equipment Required in a Forensic Lab
Electrical Needs
●
Amperage
●
Emergency Power and Lighting
●
Electrical Outlets
●
Uniterruptable Power Supply
Basic Workstation Requirements in a
Forensic Lab
• Processor with high computing speed
• 256 MB RAM for satisfying minimum processing requirements
• DVD-ROM with read/write capabilities
• Motherboard that supports IDE, SCSI, and USB, with a slot for a
LAN/WAN card and a fan attached for cooling the processor
• Tape drive, USB drive, and removable drive bays
• Monitor, keyboard, and mouse
• Minimum of two hard drives for loading two different operating
systems, preferably Windows XP and Linux
Maintaining Operating System and
Application Inventories
●
Windows Vista, XP, 2003, and 2000 operating systems
●
Linux, Unix, and Mac OS X operating systems
●
Microsoft Office XP, 2007, 2003, 2000, 97, and 95
●
Quicken
●
Programming language applications such as Visual
Studio
●
Specialized viewers such as QuickView and ACDSee
Maintaining Operating System and
Application Inventories
●
Specialized viewers such as QuickView and ACDSee
●
Corel Office Suite
●
StarOffice/OpenOffice
●
Peachtree accounting applications
●
Older operating systems and applications such as MS-
DOS, Windows 3.11, and Novell for examining older
systems
Maintaining Operating System and
Application Inventories
●
Forensic software with advanced features and
functionalities, such as:
●
Bit-stream backup utilities
●
Password recovery tools
●
Recovery tools for deleted data
●
Partition recovery tools
●
Searching tools
●
Firewalls and intrusion detection systems
●
Updated antivirus software
Required Forensic Tools
●
Storage Bags
●
Remote Chargers
●
Write Block Protection Device
●
Data Acquisition Tools
●
Forensic Archives and Restore Devices
●
Mobile Forensic Laptops
●
Forensic Workstations
●
Imaging Workstations
●
Additional Software
Thank you so much

More Related Content

PPT
Forensic laboratory setup requirements
PPTX
The Forensic Lab
PDF
Building an enterprise forensics response service
PDF
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
DOCX
Forensic laboratory setup requirements
PDF
File000117
PPT
Forensic Lab Development
PPTX
AMN_Thesis_Defense
Forensic laboratory setup requirements
The Forensic Lab
Building an enterprise forensics response service
Josh Moulin: Designing a Mobile Digital Forensic Lab on a Budget
Forensic laboratory setup requirements
File000117
Forensic Lab Development
AMN_Thesis_Defense

Similar to Latihan3 comp-forensic-bab2 (20)

PPTX
PDF
File000120
PPTX
Computer forensics and its role
PPT
CF.ppt
PPT
nalskjfaldjkflasdkjfalskdjfalsdkjfasldfelson02.ppt
PPTX
cyber Forensics
PDF
Test Bank for Guide to Computer Forensics and Investigations, 5th Edition
PPTX
Cybersecurity Centre of Excellence_Infra Requirement.pptx
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PPTX
Computer forensic 101 - OWASP Khartoum
PDF
computerforensics-140212060522-phpapp02.pdf
PPT
Introduction to computer forensic
PPT
Cyber forensics
PPT
Computer +forensics
PPTX
The design of forensic computer workstations
PPTX
Business Intelligence (BI) Tools For Computer Forensic
PPTX
Computer forensics
PDF
computerforensics-140529094816-phpapp01 (1).pdf
PPT
computer forensics, involves the preservation, identification, extraction, an...
PPTX
Practical Computer Forensic Acquire Evid in Comp Lab
File000120
Computer forensics and its role
CF.ppt
nalskjfaldjkflasdkjfalskdjfalsdkjfasldfelson02.ppt
cyber Forensics
Test Bank for Guide to Computer Forensics and Investigations, 5th Edition
Cybersecurity Centre of Excellence_Infra Requirement.pptx
PACE-IT, Security+ 2.4: Basic Forensic Procedures
Computer forensic 101 - OWASP Khartoum
computerforensics-140212060522-phpapp02.pdf
Introduction to computer forensic
Cyber forensics
Computer +forensics
The design of forensic computer workstations
Business Intelligence (BI) Tools For Computer Forensic
Computer forensics
computerforensics-140529094816-phpapp01 (1).pdf
computer forensics, involves the preservation, identification, extraction, an...
Practical Computer Forensic Acquire Evid in Comp Lab
Ad

More from sabtolinux (11)

PPT
Kasus cybercrime
PPT
Latihan9 comp-forensic-bab6
PPT
Latihan8 comp-forensic-bab5
PPT
Latihan7 comp-forensic-bab6
PPT
Latihan7 comp-forensic-bab6
PPT
Latihan6 comp-forensic-bab5
PPT
Latihan4 comp-forensic-bab3
PPT
Latihan2 comp-forensic
PPT
Latihan1 comp-forensic
PPT
Latihan 1 computer forensic
PDF
Macam2 sertifikasi linux
Kasus cybercrime
Latihan9 comp-forensic-bab6
Latihan8 comp-forensic-bab5
Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6
Latihan6 comp-forensic-bab5
Latihan4 comp-forensic-bab3
Latihan2 comp-forensic
Latihan1 comp-forensic
Latihan 1 computer forensic
Macam2 sertifikasi linux
Ad

Recently uploaded (20)

PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Architecture types and enterprise applications.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Five Habits of High-Impact Board Members
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
The various Industrial Revolutions .pptx
PDF
CloudStack 4.21: First Look Webinar slides
DOCX
search engine optimization ppt fir known well about this
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
Flame analysis and combustion estimation using large language and vision assi...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Custom Battery Pack Design Considerations for Performance and Safety
Architecture types and enterprise applications.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Five Habits of High-Impact Board Members
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
The various Industrial Revolutions .pptx
CloudStack 4.21: First Look Webinar slides
search engine optimization ppt fir known well about this
Comparative analysis of machine learning models for fake news detection in so...
A review of recent deep learning applications in wood surface defect identifi...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Enhancing plagiarism detection using data pre-processing and machine learning...
sbt 2.0: go big (Scala Days 2025 edition)
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
2018-HIPAA-Renewal-Training for executives
Flame analysis and combustion estimation using large language and vision assi...

Latihan3 comp-forensic-bab2

  • 1. Computer Forensic Lab Presented by Sabto Prabowo 4711010010
  • 2. What is Computer Forensic Lab? Its a lab/workshop who serve requirements of a forensic and what equipment is needed.
  • 3. Physical Security Needs of a Forensic Lab ● Access to emergency services ● Lighting at the site ● Physical environment of the lab ● Structural design of parking
  • 4. Physical Security Recomendation For A Lab Basic Requirements ● name of the visitor ● date and time of the visit ● purpose of the visit ● name of the official the visitor has come to see ● place the visitor has come from ● address of the visitor
  • 5. Physical Security Recomendation For A Lab Workstation Security Workstations should be shielded from transmitting electromagnetic signals. It is a known fact that electronic equipment emits electromagnetic radiation. There are certain pieces of equipment that can intercept this radiation.
  • 6. Fire Safety Fire can be disastrous in a forensic lab. Any electrical device can be a source of fire, though this does not gen erally happen with computers. On a few occasions, short circuits can also damage cables These short circuits might even ignite flammable items close by.
  • 7. Evidence Locker Recommendation The containers used to store evidence must be secured so that unauthorized persons cannot access the evidence. They should be located in a restricted area that is only accessible to lab personnel. All evidence containers must be monitored, and they must be locked when not in use.
  • 8. Checking Security of Forensic Lab • Examine the ceiling, floor, and exterior walls of the lab at least once a month to check for structural integrity. • Examine the doors to ensure they close and lock correctly. • Check if the locks are working properly or if they need to be replaced. • Examine the log register to make sure all entries are correct and complete. • Check the log sheets for evidence containers to check when the containers were opened and
  • 9. Work Area in Computer Security Lab The forensic lab should be built in an area where human traffic is light. An ideal lab consists of two forensic workstations and one ordinary workstation with Internet connectivity. The number of forensic workstations varies according to the number of cases and processes handled in the lab.
  • 10. General Config of Conputer Security Lab ● Workstation ● Uniterruptable Power Supply ● Bookracks ● Necessary Software ● References Materials ● Safe Locker and Storage shelf ● LAN and Internet Connectivity
  • 11. Equipment Required in a Forensic Lab Common Needs ● Cabinets ● Printer and Scanner ● Additional Hard Drives ● Tape Drives
  • 12. Equipment Required in a Forensic Lab Communication Needs ● Bandwidth ● Dial-Up / Broadband Access ● Local Network
  • 13. Equipment Required in a Forensic Lab Electrical Needs ● Amperage ● Emergency Power and Lighting ● Electrical Outlets ● Uniterruptable Power Supply
  • 14. Basic Workstation Requirements in a Forensic Lab • Processor with high computing speed • 256 MB RAM for satisfying minimum processing requirements • DVD-ROM with read/write capabilities • Motherboard that supports IDE, SCSI, and USB, with a slot for a LAN/WAN card and a fan attached for cooling the processor • Tape drive, USB drive, and removable drive bays • Monitor, keyboard, and mouse • Minimum of two hard drives for loading two different operating systems, preferably Windows XP and Linux
  • 15. Maintaining Operating System and Application Inventories ● Windows Vista, XP, 2003, and 2000 operating systems ● Linux, Unix, and Mac OS X operating systems ● Microsoft Office XP, 2007, 2003, 2000, 97, and 95 ● Quicken ● Programming language applications such as Visual Studio ● Specialized viewers such as QuickView and ACDSee
  • 16. Maintaining Operating System and Application Inventories ● Specialized viewers such as QuickView and ACDSee ● Corel Office Suite ● StarOffice/OpenOffice ● Peachtree accounting applications ● Older operating systems and applications such as MS- DOS, Windows 3.11, and Novell for examining older systems
  • 17. Maintaining Operating System and Application Inventories ● Forensic software with advanced features and functionalities, such as: ● Bit-stream backup utilities ● Password recovery tools ● Recovery tools for deleted data ● Partition recovery tools ● Searching tools ● Firewalls and intrusion detection systems ● Updated antivirus software
  • 18. Required Forensic Tools ● Storage Bags ● Remote Chargers ● Write Block Protection Device ● Data Acquisition Tools ● Forensic Archives and Restore Devices ● Mobile Forensic Laptops ● Forensic Workstations ● Imaging Workstations ● Additional Software
  • 19. Thank you so much