Saturday, August 25, 2012

How to collect digital evidence in the data network?

Current data network is a facility that must inevitably exist in the computer world. Working with computers since the individual no longer have this facility. LAN networks and super networks of Internet, is one of the facilities.

People increasingly rely on e-mail to communicate, E-commerce for shopping, browsing the web site to find information, and more. As the development of data networks, crime began to enter this era.

But not to worry because there are also digital evidence in this virtual world. World of Internet and data network is very extensive, and therefore digital evidence can be gathered from many points. If you want tracked, ranging from physical communication layer to application layer has the potential to store digital evidence.

However, some important points that are often used in the investigation in terms of digital data network is a testament to the e-mail, IP naming and addressing system, and the log files generated on the network and server devices.

E-mail communication system to be very important to track because now email has become a "mandatory items" in communication. So that there are many crimes that use email as an intermediary and the media.

To conduct an investigation of an e-mail, a digital proof is very important is the email header. By using existing information in the email header, investigators can determine the source of the e-mail and it is not possible to obtain the individual who sent the e-mail. E-mail header must be on every e-mail.

You can see it easily if you use a mail client like Outlook, Outlook Express, Eudora, and more. Staying just set the display manager option, then choose the option that offers you to view e-mail and its headers. This header can be read easily.

Look for sentences that begin with the word Received, you will find a few sentences in data network. Sequence is read from bottom to top. Received a sentence at the bottom shows the originating source of email, while the topmost Received shows the final destination of the e-mail.

Received a sentence of which is the order of the way e-mail. In addition to e-mail headers, IP addressing and naming is also a significant digital evidence. With IP naming and addressing system that is set up well by international institutions that deal with the problem, then it becomes easy tracking of crime.

International agencies such as ARIN (representing the United States regional area), APNIC (for Asia area), RIPE (for the European area), and more, in charge of the IP addressing system from acting as a "seller" to store the IP data network  from Anyone can find a fairly complete information about the holder of an IP address. Thus, the digital evidence to be strong enough IP addresses.

However, investigators should be more careful because of IP spoofing techniques (using a fake IP address) is often used to disrupt this digital evidence.
Log Data Network
Logs of data network devices becomes very important evidence for the devices this communication can occur, including crime. These logs can usually be obtained from various sources, ranging from

Top Ro Ro Ro

0 comments:

Post a Comment