Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.]
Many enterprises-built LANs with the assumption that internal users are trustworthy. Little thought was given to understanding exactly what devices are connected to the network, where these devices are located, and what users are doing with them. As a result, enterprises are finding themselves ill-e...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Book Section |
Language: | English |
Published: |
Division of Research, Industrial Linkages and Alumni, UiTM Cawangan Melaka
2013
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/77907/1/77907.pdf https://ir.uitm.edu.my/id/eprint/77907/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Mara |
Language: | English |
id |
my.uitm.ir.77907 |
---|---|
record_format |
eprints |
spelling |
my.uitm.ir.779072023-10-27T01:32:53Z https://ir.uitm.edu.my/id/eprint/77907/ Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.] Mohd Ali, Fakariah Hani Nik Zulkipli, Nurul Huda Kharani, Muhammad Syazwan Ahamad Zaki, Ahmad Wafiy Jama Abdi, Adnan Abeeb Computer networks. General works. Traffic monitoring Many enterprises-built LANs with the assumption that internal users are trustworthy. Little thought was given to understanding exactly what devices are connected to the network, where these devices are located, and what users are doing with them. As a result, enterprises are finding themselves ill-equipped to deal with problems introduced by mobile end systems and end users. According to Digital Forensic Investigator from Malaysian Communication and Multimedia Commission (MCMC), if cybercrime occurs in the network, they have to bring all the computers to the forensic lab before they do investigation process. This approach is costly and time consuming. This project proposed Information Investigation Autopsy (IIA) which a tool that can monitor and analyze users' activities inside the client machine in the network. IIA will capture all the activities such as keystroke pressed, timestamp and IP address and save it in the server. IIA will be analyzing the files to detect any suspicious activities. If detected, IIA will encrypt the evidence and sent the evidence to the digital forensic department. This tool will ease and give benefit to the digital forensic investor and enterprises to identify and detect the evidence if any cybercrime occurs in the local area network environment. Division of Research, Industrial Linkages and Alumni, UiTM Cawangan Melaka 2013 Book Section NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/77907/1/77907.pdf Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.]. (2013) In: RIID 2013: Optimizing Innovation for Global Commercialization Research, Invention, Innovation Design. Division of Research, Industrial Linkages and Alumni, UiTM Cawangan Melaka, Alor Gajah, Melaka, p. 21. ISBN 978-967-0637-02-0 (Submitted) |
institution |
Universiti Teknologi Mara |
building |
Tun Abdul Razak Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Mara |
content_source |
UiTM Institutional Repository |
url_provider |
http://ir.uitm.edu.my/ |
language |
English |
topic |
Computer networks. General works. Traffic monitoring |
spellingShingle |
Computer networks. General works. Traffic monitoring Mohd Ali, Fakariah Hani Nik Zulkipli, Nurul Huda Kharani, Muhammad Syazwan Ahamad Zaki, Ahmad Wafiy Jama Abdi, Adnan Abeeb Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.] |
description |
Many enterprises-built LANs with the assumption that internal users are trustworthy. Little thought was given to understanding exactly what devices are connected to the network, where these devices are located, and what users are doing with them. As a result, enterprises are finding themselves ill-equipped to deal with problems introduced by mobile end systems and end users. According to Digital Forensic Investigator from Malaysian Communication and Multimedia Commission (MCMC), if cybercrime occurs in the network, they have to bring all the computers to the forensic lab before they do investigation process. This approach is costly and time consuming. This project proposed Information Investigation Autopsy (IIA) which a tool that can monitor and analyze users' activities inside the client machine in the network. IIA will capture all the activities such as keystroke pressed, timestamp and IP address and save it in the server. IIA will be analyzing the files to detect any suspicious activities. If detected, IIA will encrypt the evidence and sent the evidence to the digital forensic department. This tool will ease and give benefit to the digital forensic investor and enterprises to identify and detect the evidence if any cybercrime occurs in the local area network environment. |
format |
Book Section |
author |
Mohd Ali, Fakariah Hani Nik Zulkipli, Nurul Huda Kharani, Muhammad Syazwan Ahamad Zaki, Ahmad Wafiy Jama Abdi, Adnan Abeeb |
author_facet |
Mohd Ali, Fakariah Hani Nik Zulkipli, Nurul Huda Kharani, Muhammad Syazwan Ahamad Zaki, Ahmad Wafiy Jama Abdi, Adnan Abeeb |
author_sort |
Mohd Ali, Fakariah Hani |
title |
Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.] |
title_short |
Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.] |
title_full |
Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.] |
title_fullStr |
Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.] |
title_full_unstemmed |
Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.] |
title_sort |
information investigation autopsy (iia) for digital forensics / fakariah hani mohd ali … [et al.] |
publisher |
Division of Research, Industrial Linkages and Alumni, UiTM Cawangan Melaka |
publishDate |
2013 |
url |
https://ir.uitm.edu.my/id/eprint/77907/1/77907.pdf https://ir.uitm.edu.my/id/eprint/77907/ |
_version_ |
1781709234777358336 |