Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.]

Many enterprises-built LANs with the assumption that internal users are trustworthy. Little thought was given to understanding exactly what devices are connected to the network, where these devices are located, and what users are doing with them. As a result, enterprises are finding themselves ill-e...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohd Ali, Fakariah Hani, Nik Zulkipli, Nurul Huda, Kharani, Muhammad Syazwan, Ahamad Zaki, Ahmad Wafiy, Jama Abdi, Adnan Abeeb
Format: Book Section
Language:English
Published: Division of Research, Industrial Linkages and Alumni, UiTM Cawangan Melaka 2013
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/77907/1/77907.pdf
https://ir.uitm.edu.my/id/eprint/77907/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Mara
Language: English
id my.uitm.ir.77907
record_format eprints
spelling my.uitm.ir.779072023-10-27T01:32:53Z https://ir.uitm.edu.my/id/eprint/77907/ Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.] Mohd Ali, Fakariah Hani Nik Zulkipli, Nurul Huda Kharani, Muhammad Syazwan Ahamad Zaki, Ahmad Wafiy Jama Abdi, Adnan Abeeb Computer networks. General works. Traffic monitoring Many enterprises-built LANs with the assumption that internal users are trustworthy. Little thought was given to understanding exactly what devices are connected to the network, where these devices are located, and what users are doing with them. As a result, enterprises are finding themselves ill-equipped to deal with problems introduced by mobile end systems and end users. According to Digital Forensic Investigator from Malaysian Communication and Multimedia Commission (MCMC), if cybercrime occurs in the network, they have to bring all the computers to the forensic lab before they do investigation process. This approach is costly and time consuming. This project proposed Information Investigation Autopsy (IIA) which a tool that can monitor and analyze users' activities inside the client machine in the network. IIA will capture all the activities such as keystroke pressed, timestamp and IP address and save it in the server. IIA will be analyzing the files to detect any suspicious activities. If detected, IIA will encrypt the evidence and sent the evidence to the digital forensic department. This tool will ease and give benefit to the digital forensic investor and enterprises to identify and detect the evidence if any cybercrime occurs in the local area network environment. Division of Research, Industrial Linkages and Alumni, UiTM Cawangan Melaka 2013 Book Section NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/77907/1/77907.pdf Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.]. (2013) In: RIID 2013: Optimizing Innovation for Global Commercialization Research, Invention, Innovation Design. Division of Research, Industrial Linkages and Alumni, UiTM Cawangan Melaka, Alor Gajah, Melaka, p. 21. ISBN 978-967-0637-02-0 (Submitted)
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Computer networks. General works. Traffic monitoring
spellingShingle Computer networks. General works. Traffic monitoring
Mohd Ali, Fakariah Hani
Nik Zulkipli, Nurul Huda
Kharani, Muhammad Syazwan
Ahamad Zaki, Ahmad Wafiy
Jama Abdi, Adnan Abeeb
Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.]
description Many enterprises-built LANs with the assumption that internal users are trustworthy. Little thought was given to understanding exactly what devices are connected to the network, where these devices are located, and what users are doing with them. As a result, enterprises are finding themselves ill-equipped to deal with problems introduced by mobile end systems and end users. According to Digital Forensic Investigator from Malaysian Communication and Multimedia Commission (MCMC), if cybercrime occurs in the network, they have to bring all the computers to the forensic lab before they do investigation process. This approach is costly and time consuming. This project proposed Information Investigation Autopsy (IIA) which a tool that can monitor and analyze users' activities inside the client machine in the network. IIA will capture all the activities such as keystroke pressed, timestamp and IP address and save it in the server. IIA will be analyzing the files to detect any suspicious activities. If detected, IIA will encrypt the evidence and sent the evidence to the digital forensic department. This tool will ease and give benefit to the digital forensic investor and enterprises to identify and detect the evidence if any cybercrime occurs in the local area network environment.
format Book Section
author Mohd Ali, Fakariah Hani
Nik Zulkipli, Nurul Huda
Kharani, Muhammad Syazwan
Ahamad Zaki, Ahmad Wafiy
Jama Abdi, Adnan Abeeb
author_facet Mohd Ali, Fakariah Hani
Nik Zulkipli, Nurul Huda
Kharani, Muhammad Syazwan
Ahamad Zaki, Ahmad Wafiy
Jama Abdi, Adnan Abeeb
author_sort Mohd Ali, Fakariah Hani
title Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.]
title_short Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.]
title_full Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.]
title_fullStr Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.]
title_full_unstemmed Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.]
title_sort information investigation autopsy (iia) for digital forensics / fakariah hani mohd ali … [et al.]
publisher Division of Research, Industrial Linkages and Alumni, UiTM Cawangan Melaka
publishDate 2013
url https://ir.uitm.edu.my/id/eprint/77907/1/77907.pdf
https://ir.uitm.edu.my/id/eprint/77907/
_version_ 1781709234777358336