<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Objectives_and_Scope_%28en%29</id>
	<title>Objectives and Scope (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Objectives_and_Scope_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Objectives_and_Scope_(en)&amp;action=history"/>
	<updated>2026-04-20T10:48:25Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Objectives_and_Scope_(en)&amp;diff=70983&amp;oldid=prev</id>
		<title>Unknown user: /* Interesting Links */</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Objectives_and_Scope_(en)&amp;diff=70983&amp;oldid=prev"/>
		<updated>2024-10-20T00:56:01Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Interesting Links&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 00:56, 20 October 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l53&quot;&gt;Line 53:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 53:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Interesting Links==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Interesting Links==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [Forensic: IT]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[&lt;/ins&gt;[Forensic: IT&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]&lt;/ins&gt;]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &amp;#039;&amp;#039;&amp;#039;Detailed Forensic Investigation Process&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &amp;#039;&amp;#039;&amp;#039;Detailed Forensic Investigation Process&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &amp;#039;&amp;#039;&amp;#039;Popular Forensic Software&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &amp;#039;&amp;#039;&amp;#039;Popular Forensic Software&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &amp;#039;&amp;#039;&amp;#039;Ethics in IT Forensics&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &amp;#039;&amp;#039;&amp;#039;Ethics in IT Forensics&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &amp;#039;&amp;#039;&amp;#039;Challenges Faced by Digital Forensics Experts&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* &amp;#039;&amp;#039;&amp;#039;Challenges Faced by Digital Forensics Experts&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Objectives_and_Scope_(en)&amp;diff=70982&amp;oldid=prev</id>
		<title>Unknown user: Created page with &quot;&#039;&#039;&#039;IT Forensics&#039;&#039;&#039; is a branch of science focused on the identification, collection, analysis, and presentation of digital evidence in a legal context. The primary goals of IT...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Objectives_and_Scope_(en)&amp;diff=70982&amp;oldid=prev"/>
		<updated>2024-10-20T00:55:43Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;IT Forensics&amp;#039;&amp;#039;&amp;#039; is a branch of science focused on the identification, collection, analysis, and presentation of digital evidence in a legal context. The primary goals of IT...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;IT Forensics&amp;#039;&amp;#039;&amp;#039; is a branch of science focused on the identification, collection, analysis, and presentation of digital evidence in a legal context. The primary goals of IT Forensics are to:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Secure Digital Evidence:&amp;#039;&amp;#039;&amp;#039; Prevent damage, modification, or deletion of digital evidence that could affect the outcome of an investigation.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Analyze Digital Evidence:&amp;#039;&amp;#039;&amp;#039; Identify, extract, and interpret relevant data from various digital devices.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Provide Admissible Evidence:&amp;#039;&amp;#039;&amp;#039; Present forensic findings in a format understandable to courts and other authorities.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;The Scope of IT Forensics&amp;#039;&amp;#039;&amp;#039; is very broad and includes various types of digital devices, such as:&lt;br /&gt;
&lt;br /&gt;
* Personal computers&lt;br /&gt;
* Laptops&lt;br /&gt;
* Smartphones&lt;br /&gt;
* Tablets&lt;br /&gt;
* Servers&lt;br /&gt;
* Storage devices (hard drives, flash drives, SD cards)&lt;br /&gt;
* Network devices&lt;br /&gt;
&lt;br /&gt;
==Types of Digital Evidence==&lt;br /&gt;
&lt;br /&gt;
Digital evidence can come in various forms, including:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Files:&amp;#039;&amp;#039;&amp;#039; Documents, images, videos, audio, and other files.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Metadata:&amp;#039;&amp;#039;&amp;#039; Information about files, such as creation date, author, and modifications.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Email:&amp;#039;&amp;#039;&amp;#039; Email messages, attachments, and email headers.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Browser History:&amp;#039;&amp;#039;&amp;#039; Websites visited, bookmarks, and cache.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Logs:&amp;#039;&amp;#039;&amp;#039; Records of system activities, such as logins, logouts, and file access.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Databases:&amp;#039;&amp;#039;&amp;#039; Collections of structured data stored in databases.&lt;br /&gt;
&lt;br /&gt;
==Applications of IT Forensics in the Real World==&lt;br /&gt;
&lt;br /&gt;
IT Forensics plays a crucial role in various cases, such as:&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Cybercrime:&amp;#039;&amp;#039;&amp;#039; Identity theft, online fraud, ransomware attacks, and hacking.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Criminal Cases:&amp;#039;&amp;#039;&amp;#039; Murder, kidnapping, and sexual harassment.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Legal Disputes:&amp;#039;&amp;#039;&amp;#039; Business disputes, copyright issues, and divorce.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Internal Investigations:&amp;#039;&amp;#039;&amp;#039; Misuse of company assets, data breaches, and policy violations.&lt;br /&gt;
&lt;br /&gt;
==Famous Cases Involving IT Forensics:==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Enron Case:&amp;#039;&amp;#039;&amp;#039; A massive accounting scandal involving data manipulation.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Sony Pictures Hack Case:&amp;#039;&amp;#039;&amp;#039; A major hack that resulted in the leak of sensitive data.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Panama Papers Case:&amp;#039;&amp;#039;&amp;#039; A leak of documents revealing tax avoidance practices by wealthy and famous individuals.&lt;br /&gt;
&lt;br /&gt;
==Examples of IT Forensics Use Cases:==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Data Recovery:&amp;#039;&amp;#039;&amp;#039; Recovering deleted or lost data due to device failure or malware attacks.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Malware Analysis:&amp;#039;&amp;#039;&amp;#039; Analyzing malware code to understand its workings and identify its origins.&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Digital Footprints:&amp;#039;&amp;#039;&amp;#039; Tracking someone&amp;#039;s online activity to identify their identity or find evidence of a crime.&lt;br /&gt;
&lt;br /&gt;
==Conclusion==&lt;br /&gt;
&lt;br /&gt;
IT Forensics is a highly important field in today&amp;#039;s digital era. With the increasing complexity of cybercrime and the growing volume of digital data, the role of IT Forensics becomes increasingly crucial in law enforcement and dispute resolution.&lt;br /&gt;
&lt;br /&gt;
==Interesting Links==&lt;br /&gt;
&lt;br /&gt;
* [Forensic: IT]&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Detailed Forensic Investigation Process&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Popular Forensic Software&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Ethics in IT Forensics&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Challenges Faced by Digital Forensics Experts&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
</feed>