SlideShare a Scribd company logo
Computer Investigation
Process
Presented By
Sabto Prabowo
What is Computer Investigation Process?
how to search for and collect evidence that
can be used in a legal case or for a corporate
inquiry, how to examine and analyze this
evidence, and other matters related to
forensic cases.
Policy and Procedure Development
- A mission statement
- The personnel requirements for the computer
forensic unit
- Administrative considerations
- Submission and retrieval of computer forensic
service requests
- Implementation of case-management procedures
- Handling of evidence
- Development of case-processing procedures
- Development of technical procedures
Investigating a Company Policy
Violation
Implementing and Enforcing Company Policy
To effectively implement such policies, the
company needs to inform each employee of the
company policy. Employees who use company
resources such as Internet or computer systems
for personal use not only violate company
policies but also waste resources, time, and
money.
Before Starting the Investigation
Legal Considerations
Some important legal points an investigator should keep in mind
are:
• Ensuring the scope of the search
• Checking for possible issues related to the federal statutes
applicable (such as the Electronic Communications Privacy Act
of 1986 [ECPA] and the Cable Communications Policy Act
[CCPA], both as amended by the USA PATRIOT Act of 2001,
and the Privacy Protection Act of 1980 [PPA]), state statutes,
and local policies and laws
10 Steps to Prepare for a Computer
Forensic Investigation
1. Do not turn the computer off or on, run any programs, or
attempt to access data on the computer. An expert will have
the appropriate tools and experience to prevent data
overwriting, damage from static electricity, or other
concerns.
2. Secure any relevant media—including hard drives,
laptops, BlackBerrys, PDAs, cell phones, CDROMs, DVDs,
USB drives, and MP3 players—the subject may have used.
3. Suspend automated document destruction and recycling
policies that may pertain to any relevant
media or users at the time of the issue.
10 Steps to Prepare for a Computer
Forensic Investigation
4. Identify the type of data you are seeking, the information
you are looking for, and the urgency level of the
examination.
5. Once the machine is secured, obtain information about
the machine, the peripherals, and the network to which it is
connected.
6. If possible, obtain passwords to access encrypted or
password-protected files.
7. Compile a list of names, e-mail addresses, and other
identifying information about those with whom the subject
might have communicated.
10 Steps to Prepare for a Computer
Forensic Investigation
8. If the computer is accessed before the forensic expert is
able to secure a mirror image, note the user(s) who
accessed it, what files they accessed, and when the access
occurred. If possible, find out why the computer was
accessed.
9. Maintain a chain of custody for each piece of original
media, indicating where the media has been, whose
possession it has been in, and the reason for that
possession.
10. Create a list of key words or phrases to use when
searching for relevant data.
Collecting The Evidence
- Obtaining a search warrant
- Preparing for searched
- Searches for warrant
- Performing a Preliminary Assessment
- Examining and Collecting Evidence
- Acquiring the Subject Evidence
- Methods of Collecting Evidence
- Securing the Computer Evidence
- Processing Location Assessment
- Chain-of-Evidence Form
Examining the Digital Evidence
- Understanding Bit-Stream Copies
- Imaging
- Making a Bit-Stream Copy Using MS-DOS
- Acquiring a Bit-Stream Copy of a Floppy Disk
Using Image
- Making a Bit-Stream Copy of Evidence Using
Image
- Write Protection
- Evidence Assessment
Examining the Digital Evidence
- Evidence Examination
- Analysis of Extracted Data
- Time-Frame Analysis
- Data-Hiding Analysis
- Application and File Analysis
- Ownership and Possession
- Documenting and Reporting
- The Final Report
THANKS FOR YOUR
ATTENTION!

More Related Content

PPTX
computer forensics
PDF
Computer Forensic
PPT
Codebits 2010
PPTX
Computer forensics
PPTX
Lect 3 Computer Forensics
PDF
Computer forensic
PPTX
computer forensics
PPTX
cyber Forensics
computer forensics
Computer Forensic
Codebits 2010
Computer forensics
Lect 3 Computer Forensics
Computer forensic
computer forensics
cyber Forensics

What's hot (20)

PDF
Computer Forensics: You can run but you can't hide
PPT
Computer Forensics
PPTX
Computer forensics powerpoint presentation
PDF
CS6004 Cyber Forensics
PPTX
Lect 5 computer forensics
PPTX
Computer Forensics
PDF
An introduction to cyber forensics and open source tools in cyber forensics
PPTX
Computer forensic
PPTX
Cyber forensic-Evedidence collection tools
PPTX
Digital&computforensic
PPTX
Computer Forensics
PDF
CS6004 Cyber Forensics - UNIT IV
DOCX
E discovery2
PPTX
Lect 6 computer forensics
PPTX
Digital investigation
PPTX
PDF
Computer forensic
PPTX
Intro to cyber forensics
PPTX
Digital Forensics Workshop
PPTX
Cyber forensic 1
Computer Forensics: You can run but you can't hide
Computer Forensics
Computer forensics powerpoint presentation
CS6004 Cyber Forensics
Lect 5 computer forensics
Computer Forensics
An introduction to cyber forensics and open source tools in cyber forensics
Computer forensic
Cyber forensic-Evedidence collection tools
Digital&computforensic
Computer Forensics
CS6004 Cyber Forensics - UNIT IV
E discovery2
Lect 6 computer forensics
Digital investigation
Computer forensic
Intro to cyber forensics
Digital Forensics Workshop
Cyber forensic 1
Ad

Viewers also liked (11)

PDF
Uu kup-001-13-uu kup 2013-00 mobile
PPT
Latihan8 comp-forensic-bab5
PPT
Latihan2 comp-forensic
PPT
Kasus cybercrime
PPT
Latihan7 comp-forensic-bab6
PDF
BriMor Labs Live Response Collection
PDF
Gummer BruCON0x07
PPT
Latihan9 comp-forensic-bab6
PDF
Building an enterprise forensics response service
PPTX
Computer forensic 101 - OWASP Khartoum
PPTX
Incident Response in the age of Nation State Cyber Attacks
Uu kup-001-13-uu kup 2013-00 mobile
Latihan8 comp-forensic-bab5
Latihan2 comp-forensic
Kasus cybercrime
Latihan7 comp-forensic-bab6
BriMor Labs Live Response Collection
Gummer BruCON0x07
Latihan9 comp-forensic-bab6
Building an enterprise forensics response service
Computer forensic 101 - OWASP Khartoum
Incident Response in the age of Nation State Cyber Attacks
Ad

Similar to Latihan4 comp-forensic-bab3 (20)

PPT
Chapter 2 - Understanding Computer Investigations.ppt
PPT
CF.ppt
PPTX
Computer forensics and its role
PDF
File000115
PPTX
Business Intelligence (BI) Tools For Computer Forensic
PPT
Cyber forensics
PPTX
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PDF
Computer forencis
PPT
Cyber forensic standard operating procedures
PPT
Ch 3C Processing Crime and Incident Scenes.ppt
PPTX
Analysis of digital evidence
PPT
cyber forensics - TYPES OF CYBER FORENSICS.ppt
PDF
Test Bank for Guide to Computer Forensics and Investigations, 5th Edition
PPTX
Chap 2 computer forensics investigation
PPT
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
PPT
Evidence Seizure
PPTX
Chapter 3 cmp forensic
PPTX
computer-forensics-8727-OHvDvOm.pptx
PPTX
computer-forensics-8727-OHvDvOm.pptx
PPT
Cyber Crime Evidence Collection Ifsa 2009
Chapter 2 - Understanding Computer Investigations.ppt
CF.ppt
Computer forensics and its role
File000115
Business Intelligence (BI) Tools For Computer Forensic
Cyber forensics
PACE-IT, Security+ 2.4: Basic Forensic Procedures
Computer forencis
Cyber forensic standard operating procedures
Ch 3C Processing Crime and Incident Scenes.ppt
Analysis of digital evidence
cyber forensics - TYPES OF CYBER FORENSICS.ppt
Test Bank for Guide to Computer Forensics and Investigations, 5th Edition
Chap 2 computer forensics investigation
Evidence Seizure Ctin Version Draft Sent To Sandy For Polishing
Evidence Seizure
Chapter 3 cmp forensic
computer-forensics-8727-OHvDvOm.pptx
computer-forensics-8727-OHvDvOm.pptx
Cyber Crime Evidence Collection Ifsa 2009

More from sabtolinux (6)

PPT
Latihan7 comp-forensic-bab6
PPT
Latihan6 comp-forensic-bab5
PPT
Latihan3 comp-forensic-bab2
PPT
Latihan1 comp-forensic
PPT
Latihan 1 computer forensic
PDF
Macam2 sertifikasi linux
Latihan7 comp-forensic-bab6
Latihan6 comp-forensic-bab5
Latihan3 comp-forensic-bab2
Latihan1 comp-forensic
Latihan 1 computer forensic
Macam2 sertifikasi linux

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
KodekX | Application Modernization Development
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Cloud computing and distributed systems.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Approach and Philosophy of On baking technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Understanding_Digital_Forensics_Presentation.pptx
Big Data Technologies - Introduction.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KodekX | Application Modernization Development
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Cloud computing and distributed systems.
Dropbox Q2 2025 Financial Results & Investor Presentation
Building Integrated photovoltaic BIPV_UPV.pdf
MYSQL Presentation for SQL database connectivity
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Approach and Philosophy of On baking technology
Programs and apps: productivity, graphics, security and other tools
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Latihan4 comp-forensic-bab3

  • 2. What is Computer Investigation Process? how to search for and collect evidence that can be used in a legal case or for a corporate inquiry, how to examine and analyze this evidence, and other matters related to forensic cases.
  • 3. Policy and Procedure Development - A mission statement - The personnel requirements for the computer forensic unit - Administrative considerations - Submission and retrieval of computer forensic service requests - Implementation of case-management procedures - Handling of evidence - Development of case-processing procedures - Development of technical procedures
  • 4. Investigating a Company Policy Violation Implementing and Enforcing Company Policy To effectively implement such policies, the company needs to inform each employee of the company policy. Employees who use company resources such as Internet or computer systems for personal use not only violate company policies but also waste resources, time, and money.
  • 5. Before Starting the Investigation Legal Considerations Some important legal points an investigator should keep in mind are: • Ensuring the scope of the search • Checking for possible issues related to the federal statutes applicable (such as the Electronic Communications Privacy Act of 1986 [ECPA] and the Cable Communications Policy Act [CCPA], both as amended by the USA PATRIOT Act of 2001, and the Privacy Protection Act of 1980 [PPA]), state statutes, and local policies and laws
  • 6. 10 Steps to Prepare for a Computer Forensic Investigation 1. Do not turn the computer off or on, run any programs, or attempt to access data on the computer. An expert will have the appropriate tools and experience to prevent data overwriting, damage from static electricity, or other concerns. 2. Secure any relevant media—including hard drives, laptops, BlackBerrys, PDAs, cell phones, CDROMs, DVDs, USB drives, and MP3 players—the subject may have used. 3. Suspend automated document destruction and recycling policies that may pertain to any relevant media or users at the time of the issue.
  • 7. 10 Steps to Prepare for a Computer Forensic Investigation 4. Identify the type of data you are seeking, the information you are looking for, and the urgency level of the examination. 5. Once the machine is secured, obtain information about the machine, the peripherals, and the network to which it is connected. 6. If possible, obtain passwords to access encrypted or password-protected files. 7. Compile a list of names, e-mail addresses, and other identifying information about those with whom the subject might have communicated.
  • 8. 10 Steps to Prepare for a Computer Forensic Investigation 8. If the computer is accessed before the forensic expert is able to secure a mirror image, note the user(s) who accessed it, what files they accessed, and when the access occurred. If possible, find out why the computer was accessed. 9. Maintain a chain of custody for each piece of original media, indicating where the media has been, whose possession it has been in, and the reason for that possession. 10. Create a list of key words or phrases to use when searching for relevant data.
  • 9. Collecting The Evidence - Obtaining a search warrant - Preparing for searched - Searches for warrant - Performing a Preliminary Assessment - Examining and Collecting Evidence - Acquiring the Subject Evidence - Methods of Collecting Evidence - Securing the Computer Evidence - Processing Location Assessment - Chain-of-Evidence Form
  • 10. Examining the Digital Evidence - Understanding Bit-Stream Copies - Imaging - Making a Bit-Stream Copy Using MS-DOS - Acquiring a Bit-Stream Copy of a Floppy Disk Using Image - Making a Bit-Stream Copy of Evidence Using Image - Write Protection - Evidence Assessment
  • 11. Examining the Digital Evidence - Evidence Examination - Analysis of Extracted Data - Time-Frame Analysis - Data-Hiding Analysis - Application and File Analysis - Ownership and Possession - Documenting and Reporting - The Final Report