Digital forensic is part of forensic science that
implicitly covers crime that is related to computer
technology. computer and network forensics have evolved to
assure proper presentation of computer crime evidentiary
data into court. The main purpose of forensic is to identify
the origin while maintaining the chain of custody in order to
enable the legal process to take its due course. Digital
forensics is essential for the successful prosecution of digital
criminals which involve diverse digital devices such as
computer system devices, network devices, mobile devices
and storage devices. If any computer related incident
happens, fundamental questions to answer are when and
where the incident occurred and, from which device, system
and geographic location did the incident originate. In this
paper a cyber crime, digital evidence investigation requires
a special procedures and techniques in order to be used and
be accepted in court of law. Generally, the goals of these
special processes are to identify the origin of the incident
reported as well as maintaining the chain of custody so that
the legal process can take its option.While digital
investigations have recently become more common, physical
investigations have existed for thousands of years and the
experience from them can be applied to the digital world.
Data warehousing is defined as a process of centralized
data management and retrieval.Data warehousing
represents an ideal vision of maintaining a central
repository of all organizational data. Centralization of
data is needed to maximize user access and analysis.
[1] Kent, K., et al., Guide to Integrating Forensic
Techniques into Incident Response, NIST Special
Publication 800-86. 2006, National Institute of
Standards and Technology, Gaithersburg, MD.
[2] Palmer, G., A Road Map for Digital Forensic
Research. 2001, Digital Forensic Research Workshop
(DFRWS): Utica, New York.
[3] Carrier, B., A Hyphotesis-based Approach to Digital
Forensic Investigations, in Center for Education &
Research in Information Assurance & Security. 2006,
Purdue University: West Lafayette. p.190.
[4] Casey, E., Digital Evidence and Computer Crime.
Second ed. 2004 Elsevier Academic Press.
[5] Stephenson, P., A Comprehensive Approach to Digital
Incident Investigation, in Elsevier Information
Security Technical Report. 2003, Elsevier Advanced
Technology.
[6] Oghazi, P., B. Pålsson, and K. Tano. An attempt to
apply traceability to grinding circuits. in Conference
in Mineral Processing. 2007. Luleå, Sweden.
[7] Golan, E., et al., Traceability in the U.S. Food Supply:
Economic Theory and Industry Studies, in
Agricultural Economic Report 2004.
[8] Clayton, R., Anonymity and Traceability in
Cyberspace., in Computer Laboratory, Darwin
College. 2005, University of Cambridge. p. 189.
[9] Siti Rahayu, S., Y. Robiah, and S. Shahrin, Mapping
Process of Digital Forensic Investigation Framework.
International Journal of Computer Science and
Network Security, 2008. 8(10): p. 163-169.
[10] Carrier, B. and E. Spafford, Getting Physical with the
Digital Investigation Process. International Journal of
Digital Evidence, 2003. 2(2).
[11] Ciardhuáin, S.Ó., An Extended Model of Cybercrime
Investigations. International Journal of Digital
Evidence, 2004. 3(1).
[12] Beebe, N.L. and J.G. Clark. A Hierarchical,
Objectives-Based Framework for the Digital
Investigations Process. in Digital Forensic Research
Workshop. 2004. Baltimore.
[13] Siti Rahayu, S., et al., Advanced Trace Pattern For
Computer Intrusion Discovery. Journal of Computing,
2010. (6): p. 1-8.
[14] Prosise, Chris, et al. Incident Response and Computer
Forensics, Second Edition. McGraw-Hill Osborne
Media, 2003.
[15] Schiffman, Mike, et al. Hacker.s Challenge 2: Test
Your Network Security & Forensic Skills. McGraw-
Hill Osborne Media, 2002.
[16] Schweitzer, Douglas. Incident Response: Computer
Forensics Toolkit. Wiley, 2003.
[17] Zalewski, Michal. Silence on the Wire: A Field Guide
to Passive Reconnaissance and Indirect Attacks. No
Starch, 2005.
[18] United States National Institute of Justice Technical
Working Group for Electronic Crime Scene
Investigation. Electronic Crime Scene Investiga-tion:
A Guide for First Responders, July 2001.
[19] Ricci I. S. C. (2006) Digital Forensics Framework
that incorporate legal issues. Available from
www.sciencedirect.com Accessed on October 20, 2010
[20] Perumal S., (2009) Digital Forensics Model Based on
Malaysian Investigation Process, IJCSNS Vol. 9 No. 8
Available from www.sciencedirect.com
[21] Salemat S. R. Yusof R. Sahib S. (2008) Mapping
Process of Digital Forensic Investigation Framework.
International Journal of Computer Science and
Network Security Vol. 8 NO 10 Available from
www.sciencedirect.com
[22] Garfinkel S., (2010) Digital forensics research: The
next 10 years. Digital Investigations 7. 2010 S64-S73.
Available from www.sciencedirect.com Accessed on
August 20, 2010
[23] Ricci I. S. C. (2006) Digital Forensics Framework
that incorporate legal issues. Available from
www.sciencedirect.com Accessed on October 20, 2010
[24] R. Ahmad, Z. Yunos, S. Sahib, and M. Yusoff.
(2012). Perception on Cyber Terrorism: A Focus
Group Discussion Approach. Journal of Information
Security, Vol. 03, No. 03, pp. 231-237. DOI:
10.4236/jis.2012.33029
[25] Prasad, K., (2012). Cyberterrorism: Addressing the
Challenges for Establishing an International Legal
Framework. In Proceedings of the 3rd Australian
Counter Terrorism Conference, December 3-5,
Novotel Langley Hotel, Perth, Western Australia.