<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Objectives_and_Scope_%28en%29</id>
	<title>Objectives and Scope (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Objectives_and_Scope_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Objectives_and_Scope_(en)&amp;action=history"/>
	<updated>2026-04-03T21:26:06Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.4</generator>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Objectives_and_Scope_(en)&amp;diff=70983&amp;oldid=prev</id>
		<title>Onnowpurbo: /* Interesting Links */</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Objectives_and_Scope_(en)&amp;diff=70983&amp;oldid=prev"/>
		<updated>2024-10-20T00:56:01Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Interesting Links&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 00:56, 20 October 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l53&quot; &gt;Line 53:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 53:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Interesting Links==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Interesting Links==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [Forensic: IT]&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[&lt;/ins&gt;[Forensic: IT&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;]&lt;/ins&gt;]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* '''Detailed Forensic Investigation Process'''&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* '''Detailed Forensic Investigation Process'''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* '''Popular Forensic Software'''&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* '''Popular Forensic Software'''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* '''Ethics in IT Forensics'''&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* '''Ethics in IT Forensics'''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* '''Challenges Faced by Digital Forensics Experts'''&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* '''Challenges Faced by Digital Forensics Experts'''&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Objectives_and_Scope_(en)&amp;diff=70982&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot;'''IT Forensics''' is a branch of science focused on the identification, collection, analysis, and presentation of digital evidence in a legal context. The primary goals of IT...&quot;</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Objectives_and_Scope_(en)&amp;diff=70982&amp;oldid=prev"/>
		<updated>2024-10-20T00:55:43Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;IT Forensics&amp;#039;&amp;#039;&amp;#039; is a branch of science focused on the identification, collection, analysis, and presentation of digital evidence in a legal context. The primary goals of IT...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''IT Forensics''' is a branch of science focused on the identification, collection, analysis, and presentation of digital evidence in a legal context. The primary goals of IT Forensics are to:&lt;br /&gt;
&lt;br /&gt;
* '''Secure Digital Evidence:''' Prevent damage, modification, or deletion of digital evidence that could affect the outcome of an investigation.&lt;br /&gt;
* '''Analyze Digital Evidence:''' Identify, extract, and interpret relevant data from various digital devices.&lt;br /&gt;
* '''Provide Admissible Evidence:''' Present forensic findings in a format understandable to courts and other authorities.&lt;br /&gt;
&lt;br /&gt;
'''The Scope of IT Forensics''' is very broad and includes various types of digital devices, such as:&lt;br /&gt;
&lt;br /&gt;
* Personal computers&lt;br /&gt;
* Laptops&lt;br /&gt;
* Smartphones&lt;br /&gt;
* Tablets&lt;br /&gt;
* Servers&lt;br /&gt;
* Storage devices (hard drives, flash drives, SD cards)&lt;br /&gt;
* Network devices&lt;br /&gt;
&lt;br /&gt;
==Types of Digital Evidence==&lt;br /&gt;
&lt;br /&gt;
Digital evidence can come in various forms, including:&lt;br /&gt;
&lt;br /&gt;
* '''Files:''' Documents, images, videos, audio, and other files.&lt;br /&gt;
* '''Metadata:''' Information about files, such as creation date, author, and modifications.&lt;br /&gt;
* '''Email:''' Email messages, attachments, and email headers.&lt;br /&gt;
* '''Browser History:''' Websites visited, bookmarks, and cache.&lt;br /&gt;
* '''Logs:''' Records of system activities, such as logins, logouts, and file access.&lt;br /&gt;
* '''Databases:''' Collections of structured data stored in databases.&lt;br /&gt;
&lt;br /&gt;
==Applications of IT Forensics in the Real World==&lt;br /&gt;
&lt;br /&gt;
IT Forensics plays a crucial role in various cases, such as:&lt;br /&gt;
&lt;br /&gt;
* '''Cybercrime:''' Identity theft, online fraud, ransomware attacks, and hacking.&lt;br /&gt;
* '''Criminal Cases:''' Murder, kidnapping, and sexual harassment.&lt;br /&gt;
* '''Legal Disputes:''' Business disputes, copyright issues, and divorce.&lt;br /&gt;
* '''Internal Investigations:''' Misuse of company assets, data breaches, and policy violations.&lt;br /&gt;
&lt;br /&gt;
==Famous Cases Involving IT Forensics:==&lt;br /&gt;
&lt;br /&gt;
* '''Enron Case:''' A massive accounting scandal involving data manipulation.&lt;br /&gt;
* '''Sony Pictures Hack Case:''' A major hack that resulted in the leak of sensitive data.&lt;br /&gt;
* '''Panama Papers Case:''' A leak of documents revealing tax avoidance practices by wealthy and famous individuals.&lt;br /&gt;
&lt;br /&gt;
==Examples of IT Forensics Use Cases:==&lt;br /&gt;
&lt;br /&gt;
* '''Data Recovery:''' Recovering deleted or lost data due to device failure or malware attacks.&lt;br /&gt;
* '''Malware Analysis:''' Analyzing malware code to understand its workings and identify its origins.&lt;br /&gt;
* '''Digital Footprints:''' Tracking someone's online activity to identify their identity or find evidence of a crime.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
IT Forensics is a highly important field in today's digital era. With the increasing complexity of cybercrime and the growing volume of digital data, the role of IT Forensics becomes increasingly crucial in law enforcement and dispute resolution.&lt;br /&gt;
&lt;br /&gt;
==Interesting Links==&lt;br /&gt;
&lt;br /&gt;
* [Forensic: IT]&lt;br /&gt;
* '''Detailed Forensic Investigation Process'''&lt;br /&gt;
* '''Popular Forensic Software'''&lt;br /&gt;
* '''Ethics in IT Forensics'''&lt;br /&gt;
* '''Challenges Faced by Digital Forensics Experts'''&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>