SlideShare uma empresa Scribd logo
1 de 25
Free Powerpoint Templates Digital Forensics Don Anto PRESENTED FOR 23 NOVEMBER 2011
Don Anto? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Forensics? ,[object Object],[object Object],[object Object]
Computer Forensics? ,[object Object],[object Object]
Network Forensics? ,[object Object],[object Object],[object Object]
Methodology? ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Identify ?
Con’t Identify ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collect Evidence? ,[object Object],[object Object]
Collect Evidence - Computer?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collect Evidence - Network?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Preserve Evidence ?  ,[object Object],[object Object],[object Object]
Con’t - Preserve Evidence ? ,[object Object],[object Object],[object Object],[object Object]
Con’t - Preserve Evidence ? ,[object Object],[object Object],[object Object],[object Object]
Evidence Analysis? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Evidence Analysis?
Media Analysis? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Analysis? ,[object Object],[object Object],[object Object],[object Object]
Indicator of Compromise? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Present? ,[object Object],[object Object],[object Object]
Forensics - Useful Tools?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Forensics - Useful Resources?  ,[object Object],[object Object],[object Object],[object Object],[object Object]
DEMO FORENSIC
DISKUSI Q&A
THANK YOU

Mais conteúdo relacionado

Semelhante a Network & Computer Forensic

PengantarTeknologiInformasi (2).ppt
PengantarTeknologiInformasi (2).pptPengantarTeknologiInformasi (2).ppt
PengantarTeknologiInformasi (2).ppt
wendymuliadi1
 
Materi 6-keamanan-komputer-keamanan-jringan-komputer
Materi 6-keamanan-komputer-keamanan-jringan-komputerMateri 6-keamanan-komputer-keamanan-jringan-komputer
Materi 6-keamanan-komputer-keamanan-jringan-komputer
sulaiman yunus
 
Komponen hard n soft ware
Komponen hard n soft wareKomponen hard n soft ware
Komponen hard n soft ware
amron_AG
 
nii-security.PPTbshsjajahqjqkqkqkwhehehjjaj
nii-security.PPTbshsjajahqjqkqkqkwhehehjjajnii-security.PPTbshsjajahqjqkqkqkwhehehjjaj
nii-security.PPTbshsjajahqjqkqkqkwhehehjjaj
AnggaHermawan28
 
Pertemuan_6_-_IT_Forensik_dan_Profesionalisme_Kerja.pptx
Pertemuan_6_-_IT_Forensik_dan_Profesionalisme_Kerja.pptxPertemuan_6_-_IT_Forensik_dan_Profesionalisme_Kerja.pptx
Pertemuan_6_-_IT_Forensik_dan_Profesionalisme_Kerja.pptx
GombalTrendy1
 
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
dewizulfah
 

Semelhante a Network & Computer Forensic (20)

Tugas paper konsep penerapan
Tugas paper konsep penerapan Tugas paper konsep penerapan
Tugas paper konsep penerapan
 
PENGANTAR TEKNOLOGI INFORMATIKA
PENGANTAR TEKNOLOGI INFORMATIKAPENGANTAR TEKNOLOGI INFORMATIKA
PENGANTAR TEKNOLOGI INFORMATIKA
 
10. sim, ronna azami dwi septiani, hapzi ali, information security, universit...
10. sim, ronna azami dwi septiani, hapzi ali, information security, universit...10. sim, ronna azami dwi septiani, hapzi ali, information security, universit...
10. sim, ronna azami dwi septiani, hapzi ali, information security, universit...
 
02 pengenalan tik-edited
02 pengenalan tik-edited02 pengenalan tik-edited
02 pengenalan tik-edited
 
Digital forensik investigasi
Digital forensik investigasiDigital forensik investigasi
Digital forensik investigasi
 
Pengantar teknologi informasi
Pengantar teknologi informasiPengantar teknologi informasi
Pengantar teknologi informasi
 
Pengantar Teknologi Informasi - PPAK.ppt
Pengantar Teknologi Informasi - PPAK.pptPengantar Teknologi Informasi - PPAK.ppt
Pengantar Teknologi Informasi - PPAK.ppt
 
PengantarTeknologiInformasi (2).ppt
PengantarTeknologiInformasi (2).pptPengantarTeknologiInformasi (2).ppt
PengantarTeknologiInformasi (2).ppt
 
10. sim,prima tri puspita, hapzi ali, information security, universitas mercu...
10. sim,prima tri puspita, hapzi ali, information security, universitas mercu...10. sim,prima tri puspita, hapzi ali, information security, universitas mercu...
10. sim,prima tri puspita, hapzi ali, information security, universitas mercu...
 
Materi 6-keamanan-komputer-keamanan-jringan-komputer
Materi 6-keamanan-komputer-keamanan-jringan-komputerMateri 6-keamanan-komputer-keamanan-jringan-komputer
Materi 6-keamanan-komputer-keamanan-jringan-komputer
 
Komponen hard n soft ware
Komponen hard n soft wareKomponen hard n soft ware
Komponen hard n soft ware
 
7 Digital Forensik.pptx
7 Digital Forensik.pptx7 Digital Forensik.pptx
7 Digital Forensik.pptx
 
10. sim,rizka fitriani, hapzi ali, information security, universitas mercu bu...
10. sim,rizka fitriani, hapzi ali, information security, universitas mercu bu...10. sim,rizka fitriani, hapzi ali, information security, universitas mercu bu...
10. sim,rizka fitriani, hapzi ali, information security, universitas mercu bu...
 
Digital forensic | DIGITAL FORENSIC
Digital forensic | DIGITAL FORENSICDigital forensic | DIGITAL FORENSIC
Digital forensic | DIGITAL FORENSIC
 
10. sim,vivi apriliza, hapzi ali, information security, universitas mercu bua...
10. sim,vivi apriliza, hapzi ali, information security, universitas mercu bua...10. sim,vivi apriliza, hapzi ali, information security, universitas mercu bua...
10. sim,vivi apriliza, hapzi ali, information security, universitas mercu bua...
 
nii-security.PPTbshsjajahqjqkqkqkwhehehjjaj
nii-security.PPTbshsjajahqjqkqkqkwhehehjjajnii-security.PPTbshsjajahqjqkqkqkwhehehjjaj
nii-security.PPTbshsjajahqjqkqkqkwhehehjjaj
 
Pertemuan_6_-_IT_Forensik_dan_Profesionalisme_Kerja.pptx
Pertemuan_6_-_IT_Forensik_dan_Profesionalisme_Kerja.pptxPertemuan_6_-_IT_Forensik_dan_Profesionalisme_Kerja.pptx
Pertemuan_6_-_IT_Forensik_dan_Profesionalisme_Kerja.pptx
 
Digital forensic upload
Digital forensic uploadDigital forensic upload
Digital forensic upload
 
Forum 10
Forum 10Forum 10
Forum 10
 
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
10, SIM, Dewi Zulfah, Hapzi Ali, Sistem Informasi Manajemen, Mercu Buana Univ...
 

Mais de Don Anto (6)

Red Team: Emulating Advanced Adversaries in Cyberspace
Red Team: Emulating Advanced Adversaries in CyberspaceRed Team: Emulating Advanced Adversaries in Cyberspace
Red Team: Emulating Advanced Adversaries in Cyberspace
 
IPv6 Fundamentals & Securities
IPv6 Fundamentals & SecuritiesIPv6 Fundamentals & Securities
IPv6 Fundamentals & Securities
 
BGP Vulnerability
BGP VulnerabilityBGP Vulnerability
BGP Vulnerability
 
Web & Wireless Hacking
Web & Wireless HackingWeb & Wireless Hacking
Web & Wireless Hacking
 
Spying The Wire
Spying The WireSpying The Wire
Spying The Wire
 
Distributed Cracking
Distributed CrackingDistributed Cracking
Distributed Cracking
 

Network & Computer Forensic