Discussion and Sharing Network and Image Forensics

Discussion and Sharing Network and Image Forensics

Bandung, SOC – Thursday (03/19/2015), the School of Computing Telkom University received the arrival of the Central Team of the Forensics Laboratory of the Indonesian Police Criminal Investigation Unit. Their arrival this time is to share about network and image forensics . This event was attended by Head of the Forensics Laboratory of the Indonesian Police Criminal Investigation Agency: Commissioner Andi Firdaus and Head of the Forensic Computer Laboratory of the Indonesian Police Criminal Investigation Agency: AKBP Muhammad Nuh Al-Azhar. Also attending this event, Dean of the School of Information: Dr. Maman Abdurohman, Vice Dean 1 of the School of Information: Dr. Adiwijaya, and Vice Dean II of the School of Information: Rimba Whidiana Ciptasari, Ph.D. along with fellow lecturers and students of the Lab. Foresty.

“Our arrival this time is to share with our research friends, we do not rule out if there is input from friends about our discussion today,” said Commissioner Andi Firdaus.

Network forensics ( Network forensic ) is the process of capturing, recording and analyzing network activity to find digital evidence ( digital evidence ) of an attack or crime committed against or executed using a computer network so that the perpetrators of crimes can be prosecuted according to applicable law.

Digital evidence can be identified from recognizable attack patterns, deviations from normal network behavior or deviations from security policies applied to the network.

“There are 5 fields of forensics handled by the Indonesian Police Criminal Investigation Agency, namely: drugs, documents forensics, ballistics & forensics, chemistry & biology forensics, and physics & computer forensics, “he continued.

Network forensics (network forensics) is a branch of digital forensics that deals with monitoring and analyzing computer network traffic to gather information, legal evidence, or intrusion detection.

Network forensics generally has two uses. The first is related to security, which involves monitoring networks for anomalous traffic and identifying intrusions. And the second is relevant to law enforcement. In this case, the analysis of network traffic is captured, which includes tasks of rearranging file transfers, searching for keywords and parsing communications such as e-mail or chat sessions.

Gallery of activities can be seen at: https://soc.telkomuniversity.ac.id/gallery/galeri-discussion-and-sharing-network-and-image-forensics/