Academic literature on the topic 'IT-forensik'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IT-forensik.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IT-forensik"
Freiling, Felix C., and Konstantin Sack. "Selektive Datensicherungen in der IT-Forensik." Datenschutz und Datensicherheit - DuD 38, no. 2 (February 2014): 112–17. http://dx.doi.org/10.1007/s11623-014-0043-7.
Full textGilani, Sayyid Mohammad Yunus, and K. M. Zakir Hossain Shalim. "Forensic Evidence in Proving Crimes: Exploring the Legal Frameworks of Sharīʿah Bukti Forensik Bagi Membuktikan Jenayah: Menerokai Rangka Kerja Guaman Sharīʿah." Journal of Islam in Asia (E-ISSN: 2289-8077) 13, no. 1 (July 19, 2016): 220–47. http://dx.doi.org/10.31436/jia.v13i1.530.
Full textValerius, Brian. "Dennis Heinson: IT-Forensik. Zur Erhebung und Verwertung von Beweisen aus informationstechnischen Systemen." JuristenZeitung 72, no. 4 (2017): 192. http://dx.doi.org/10.1628/002268816x14744527286593.
Full textNasrulloh, Imam Mahfudl, Sunardi Sunardi, and Imam Riadi. "Analisis Forensik Solid State Drive (SSD) Menggunakan Framework Rapid Response." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 5 (October 8, 2019): 509. http://dx.doi.org/10.25126/jtiik.2019651516.
Full textPutra, Roni Anggara, Abdul Fadlil, and Imam Riadi. "Forensik Mobile Pada Smartwatch Berbasis Android." Jurnal Rekayasa Teknologi Informasi (JURTI) 1, no. 1 (June 8, 2017): 41. http://dx.doi.org/10.30872/jurti.v1i1.638.
Full textHatta, Muhammad, Zulfan Zulfan, and Srimulyani Srimulyani. "Bedah mayat (autopsi) ditinjau dari perspekif hukum positif Indonesia dan hukum Islam." Ijtihad : Jurnal Wacana Hukum Islam dan Kemanusiaan 19, no. 1 (June 1, 2019): 27–52. http://dx.doi.org/10.18326/ijtihad.v19i1.27-52.
Full textHatta, Muhammad. "Bedah mayat (autopsi) ditinjau dari perspekif hukum positif Indonesia dan hukum Islam." Ijtihad : Jurnal Wacana Hukum Islam dan Kemanusiaan 19, no. 1 (June 1, 2019): 27–52. http://dx.doi.org/10.18326/ijtihad.v1i1.27-52.
Full textSuriyanto, Rusyad Adi. "ARKEOLOGI FORENSIK: PERKEMBANGAN DAN CAPAIANNYA DI INDONESIA." Berkala Arkeologi 36, no. 1 (May 31, 2016): 45–70. http://dx.doi.org/10.30883/jba.v36i1.224.
Full textMualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 7, 2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.
Full textSatrya, Gandeva Bayu, and A. Ahmad Nasrullah. "Analisis Forensik Android: Artefak pada Aplikasi Penyimpanan Awan Box." Jurnal Teknologi Informasi dan Ilmu Komputer 7, no. 3 (May 22, 2020): 521. http://dx.doi.org/10.25126/jtiik.2020732220.
Full textDissertations / Theses on the topic "IT-forensik"
Ekman, Sebastian. "En IT Forensik utredning med fria verktyg." Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40101.
Full textMosgeller, Johanna. "IT-forensik i dagens rättssamhälle : En studie om kunskapen kring IT-forensik och användandet av digitala bevis i Sverige." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-29850.
Full textNilsson, Tor. "It-forensikers Guide till Universum : Framtagning av övningsmaterial för nyanställda IT-forensiker." Thesis, Högskolan i Halmstad, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-29008.
Full textBarkstedt, Patrik, and Sandro Bizzarri. "Forensisk analys av smartphones : - fokus på sociala medier." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23893.
Full textBroman, Jennifer. "SNMP inom IT-forensik : Hur kan SNMP användas för IT-forensiska syften?" Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40106.
Full textWernebjer, Cervinus Daniel, and Patrik Brorsson. "En Jämförelse mellan EnCase och BackTrack : Examensarbete på programmet IT-forensik och informationssäkerhet, 120 hp." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4530.
Full textDenna rapporten är en jämförelse av forensiska verktyg, i detta fallet är verktygen EnCase och BackTrack. Vi kommer i den här rapporten att jämföra vissa utvalda verktyg som representeras i båda programmen, och analysera resultatet av detta. Analysen och jämförelsen kommer därefter ligga till grund för om man kan få fram lika bra resultat med ett open-source program som med ett program man betalar för. Vi kommer att utföra analysen genom att använda en bevisfil och utföra tester på den i både BackTrack och EnCase. Resultatet kommer att diskuteras och presenteras i denna rapport.För att få fram bästa möjliga resultat kommer vi även att intervjua vissa utvalda personer med erfarenhet utav att arbeta med dessa program, för att få fram deras synpunkter
Bergholm, Johan, Sascha Gallardo, and Jonny Svensson. "Positionering och Spårning av mobila enheter, ur ett IT–forensiskt perspektiv." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24177.
Full textLars, Bartha. "Biometriska säkerhetslösningars inverkan på IT-forensik inom polisen : En kvalitativ intervjustudie." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-16469.
Full textPasswords have long been the users’ preferred method of choice to protect user accounts and sensitive data. In a strive to find simpler, quicker and more secure forms of authentication methods, biometric security solutions have seen an increased in popularity. Most mobile phones now include a type of biometrical sensors as an option for authentication. By conducting a qualitative interview study with IT-forensics employed by the police force in different districts in Västra Götaland county, this study aims to investigate the research question: How have biometric security solutions in comparison to passwords influenced the working methods of IT-forensics at the Swedish Police Authority? The study shows that biometric security solutions give no added benefit to security in comparison to passwords, because there is always an underlying security code that is ready to be used in case the biometric authentication fails to work. Therefore, biometric devices suffer from the same kinds of weaknesses that have always plagued passwords. Keywords: biometrics, passwords, security, ethics, law, IT-forensics.
Olsson, Andreas. "Hanteringen av integritetsperspektiv inom IT-forensik : En kvalitativ intervjustudie med rättsväsendets aktörer." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17208.
Full textDigital forensics has been around for many years and has emerged in criminal investigations since more is being digitized in our society. At the same time as there is more digitization, the amount of data within IT increases. Much of our private life is stored in phones or computers, such as pictures or personal data. In recent years, the privacy has become more important for each individual and to follow human rights is a must in the present. Digital forensics in its very core is a privacy infringement of the suspect which means that the actors who perform this must be more cautious and consider the privacy of the people involved. The purpose of this work has been to investigate how the actors in the judicial system manage the perspective of privacy during IT forensic investigations and to get a picture of how this is applied in practice. The actors who were interviewed in this qualitative study were prosecutors, judges and defenders. The results show that there are a lot of gray areas and that very personal assessments and interpretations are made by the actors. The law, in theory, explains how certain elements should be done, but when applied in practice, this becomes much more complicated. This results in the actors getting separate opinions of how they should be applied, furthermore who should have access to what and how to handle the privacy.
Gustavsson, Daniel. "Molnforensik : En litteraturstudie om tekniska utmaningar och möjligheter inom IT-forensik mot molnet." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19049.
Full textCloud services are being used all over the world today and provides several benefits for a user or a company. A downside with the cloud is that it is an environment that criminals can use to conduct a crime. One reason why a criminal uses the cloud to conduct a crime is due to the lack of suitable digital forensic techniques against the cloud environment. When a crime has been reported in the cloud, a digital forensics investigation can occur to gather digital evidence to determine what has happened. Unfortunately, this could be problematic because of the complexity of the cloud environment. The traditional way of conducting a digital forensic investigation becomes a challenge in the cloud because of several reasons. Some of the reasons are the dynamic environment of the cloud and that several users share the same resources. This study will conduct a systematic literature review to identify technical challenges and possibilities in a digital forensic investigation in the cloud. Several challenges and possibilities were identified from existing literature which in turn got categorized and compiled into models. This study presents challenges, for example the data in the cloud is not centralized and virtual machines may be in a volatile state. There are several possibilities for instance, collecting snapshot for analysis and collect evidence from a client’s computer.
Book chapters on the topic "IT-forensik"
Heinson, Dennis. "IT-Forensik und Beweisrecht." In DGRI Jahrbuch 2015. Köln: Verlag Dr. Otto Schmidt, 2016. http://dx.doi.org/10.9785/9783504385248-007.
Full textRoßberg, Jürgen. "Die IT-Forensik der Hessischen Steuerfahndung im Wandel der Zeit." In Festschrift 70 Jahre Bundesfinanzakademie, 153–64. Verlag Dr. Otto Schmidt, 2020. http://dx.doi.org/10.9785/9783504387112-017.
Full text