dc.description.abstract | In more and more developed technology society, information system security is becoming an important factor that all developers and system administrators have to consider. Either a small system such as mobile mini games or massive system such as Google and Facebook need to have an excellent protection mechanism to prevent hacker to get the information and do some bad things with it. There are a lot of research concerning developing such system to prevent the attacks from hacker or investigate who had did these evil things, however, there are no absolutely solution for all of this problem. We tend to create small pieces of tool or method and then combining it together to solve our problem or to protect our system for best practice.
We will take a close look on how to develop a forensic tool to extract such important information, how to combine and use available programming framework, design and program forensic system. There are also various of threats that we have to take care of to protect our private information, these threats such as botnets, malicious application, social networking, spyware, attacking through wireless connection such as Bluetooth and Wireless devices. This documentation does not focus on how to protect systems such as Android system, but on how to find important of system attack like IP address, related files, phone number, file relating to the case you aim to investigate. It also focuses on some practical case that we must use forensic tool to deal with the problem more easily, find out the mechanism of attackers, from these information, we will know better on how
v
to protect our system from these threats. In some case, with the allowance of law enforcement, we can use this forensic tool to extract the evidence of crime. | en_US |